• Title/Summary/Keyword: Resource interference

Search Result 338, Processing Time 0.022 seconds

Multiple-Phase Energy Detection and Effective Capacity Based Resource Allocation Against Primary User Emulation Attacks in Cognitive Radio Networks

  • Liu, Zongyi;Zhang, Guomei;Meng, Wei;Ma, Xiaohui;Li, Guobing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1313-1336
    • /
    • 2020
  • Cognitive radio (CR) is regarded as an effective approach to avoid the inefficient use of spectrum. However, CRNs have more special security problems compared with the traditional wireless communication systems due to its open and dynamic characteristics. Primary user emulation attack (PUEA) is a common method which can hinder secondary users (SUs) from accessing the spectrum by transmitting signals who has the similar characteristics of the primary users' (PUs) signals, and then the SUs' quality of service (QoS) cannot be guaranteed. To handle this issue, we first design a multiple-phase energy detection scheme based on the cooperation of multiple SUs to detect the PUEA more precisely. Second, a joint SUs scheduling and power allocation scheme is proposed to maximize the weighted effective capacity of multiple SUs with a constraint of the average interference to the PU. The simulation results show that the proposed method can effectively improve the effective capacity of the secondary users compared with the traditional overlay scheme which cannot be aware of the existence of PUEA. Also the good delay QoS guarantee for the secondary users is provided.

A Design of New Real Time Monitoring Embedded Controller using Boundary Scan Architecture (경계 주사 구조를 이용한 새로운 실시간 모니터링 실장 제어기 설계)

  • 박세현
    • Journal of Korea Multimedia Society
    • /
    • v.4 no.6
    • /
    • pp.570-578
    • /
    • 2001
  • Boundary scan architecture test methodology was introduced to facilitate the testing of complex printed circuit board. The boundary scan architecture has a tremendous potential for real time monitoring of the operational status of a system without interference of normal system operation. In this paper, a new type of embedded controller for real time monitoring of the operational status of a system is proposed and designed by using boundary scan architecture. The proposed real time monitoring embedded controller consists of test access port controller and an embedded controller proposed real time monitoring embedded controller using boundary scan architecture can save the hard-wire resource and can easily interface with boundary scan architecture chip. Experimental results show that the real time monitoring using proposed embedded controller is more effective then the real time monitoring using host computer.

  • PDF

Evaluation Method of Weed Suppression by Rice Plant

  • Lee Sang-Bok;Ku Yeon Chung;Seong Ki Young;Song Duck Young;Seo Kyung In;Shin Jin Chul
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.50 no.2
    • /
    • pp.79-83
    • /
    • 2005
  • Rice and weed interference in the paddy field caused by resource competition and allelopathy. Evaluation method of active weed suppressive behavior of rice to weed was developed by eliminating light competition at soil condition. Twenty eight days old rice seedlings (6-7 leaf stage) which was grown at saturated, no drainage pot were clipped above $3\~4cm$ from the soil surface. Weeds seeded around clipped rice stem, named ratoon seeding screening method, showed varietal suppressive difference to Echinochloa crus-galli, Echinochloa crusgalli var. praticola and Monochoria vaginalis. Potential allelopathic rice varieties, Sathi, AC1423 and PI312777 showed better suppressive activity to weed seedling growth than Nonganbyeo and Keumobyeo. Weed suppression of one plant of rice cultivars could be evaluated by the cell size of $2.5\times2.5cm$ at rice clipping of seedling 29 days after rice seeding.

Joint Mode Selection, Link Allocation and Power Control in Underlaying D2D Communication

  • Zhang, Wei;He, Wanbing;Wu, Dan;Cai, Yueming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5209-5228
    • /
    • 2016
  • Device-to-device (D2D) communication underlaying cellular networks can bring significate benefits for improving the performance of mobile services. However, it hinges on elaborate resource sharing scheme to coordinate interference between cellular users and D2D pairs. We formulate a joint mode selection, link allocation and power control optimization problem for D2D communication sharing uplink resources in a multi-user cellular network and consider the efficiency and the fairness simultaneously. Due to the non-convex difficulty, we propose a three-step scheme: firstly, we conduct mode selection for D2D pairs based on a minimum distance metric after an admission control and obtain some cellular candidates for them. And then, a cellular candidate will be paired to each D2D pair based on fairness. Finally, we use Lagrangian Algorithm to formulate a joint power control strategy for D2D pairs and their reused cellular users and a closed-form of solution is derived. Simulation results demonstrate that our proposed algorithms converge in a short time. Moreover, both the sum rate of D2D pairs and the energy efficiency of cellular users are improved.

A Generalized Markovian Based Framework for Dynamic Spectrum Access in Cognitive Radios

  • Muthumeenakshi, K.;Radha, S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1532-1553
    • /
    • 2014
  • Radio spectrum is a precious resource and characterized by fixed allocation policy. However, a large portion of the allocated radio spectrum is underutilized. Conversely, the rapid development of ubiquitous wireless technologies increases the demand for radio spectrum. Cognitive Radio (CR) methodologies have been introduced as a promising approach in detecting the white spaces, allowing the unlicensed users to use the licensed spectrum thus realizing Dynamic Spectrum Access (DSA) in an effective manner. This paper proposes a generalized framework for DSA between the licensed (primary) and unlicensed (secondary) users based on Continuous Time Markov Chain (CTMC) model. We present a spectrum access scheme in the presence of sensing errors based on CTMC which aims to attain optimum spectrum access probabilities for the secondary users. The primary user occupancy is identified by spectrum sensing algorithms and the sensing errors are captured in the form of false alarm and mis-detection. Simulation results show the effectiveness of the proposed spectrum access scheme in terms of the throughput attained by the secondary users, throughput optimization using optimum access probabilities, probability of interference with increasing number of secondary users. The efficacy of the algorithm is analyzed for both imperfect spectrum sensing and perfect spectrum sensing.

QoSCM: QoS-aware Coded Multicast Approach for Wireless Networks

  • Mohajer, Amin;Barari, Morteza;Zarrabi, Houman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5191-5211
    • /
    • 2016
  • It is essential to satisfy class-specific QoS constraints to provide broadband services for new generation networks. The present study proposes a QoS-driven multicast scheme for wireless networks in which the transmission rate and end-to-end delay are assumed to be bounded during a multiple multicast session. A distributed algorithm was used to identify a cost-efficient sub-graph between the source and destination which can satisfy QoS constraints of a multicast session. The model was then modified as to be applied for wireless networks in which satisfying interference constraints is the main challenge. A discrete power control scheme was also applied for the QoS-aware multicast model to accommodate the effect of transmission power level based on link capacity requirements. We also proposed random power allocation (RPA) and gradient power allocation (GPA) algorithms to efficient resource distribution each of which has different time complexity and optimality levels. Experimental results confirm that the proposed power allocation techniques decrease the number of unavailable links between intermediate nodes in the sub-graph and considerably increase the chance of finding an optimal solution.

High-Speed Generation Technique of Digital holographic Contents based on GPGPU (GPGPU기반의 디지털 홀로그램 콘텐츠의 고속 생성 기법)

  • Lee, Yoon Hyuk;Kim, Dong Wook;Seo, Young Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.151-163
    • /
    • 2013
  • Recently the attention on digital hologram that is regarded as to be the final goal of the 3-dimensional video technology has been increased. Digital hologram is calculated by modeling the interference phenomenon between an object wave and a reference wave. The modeling for digital holograms is called by computer generated hologram (CGH) Generally, CGH requires a very large amount of calculation. So if holograms are generated in real time, high-speed method should be needed. In this paper, we analyzed CGH equation, optimized it for mapping general purpose graphic processing unit (GPGPU), and proposed a optimized CGH calculation technique for GPGPU by resource allocation and various experiments which include block size changing, memory selection, and hologram tiling. The implemented results showed that a digital hologram that has $1,024{\times}1,024$ resolution can be generated during approximately 24ms, using 1K point clouds. In the experiment, we used two GTX 580 GPGPU of nVidia Inc.

An Optimal Design Guide for Campus wireless LAN by Evaluating Performance Measurements in IEEE 802.11n-based Networks (IEEE 802.11n 기반에서 성능측정을 통한 최적의 캠퍼스 무선 랜 설계)

  • Kim, Bang Ryong;Lee, Kil Hung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.9-23
    • /
    • 2013
  • In recent days, there are many researches of wireless LAN services as the communication environment of wireless LAN are so improved that a lot of services are available in wireless environments. The frequency of the wireless LAN is a general resource that can be used to everyone without any permission. Many technologies using this ISM (Industry Science Medical) frequency band are developed fast and widely. But, as many devices use the same frequency band at th same time, the service quality is degraded and the speed of the service rate id degraded by the result of the interference. For overcome this problem, we must provide the new technology of the mobile devices and a new cell design scheme for obtaining maximum throughput that considering the wireless environments effectively. In this paper, we explain the main technology at the IEEE 802.11n environments and proposes the optimal cell design and reference model for gaining maximum performance to many mobile devices at the same time by investigating real environment testing results.

Establishment of a Wind Map of the Korean Peninsula I. Evaluation of Offshore Wind Resources Using Remote-Sensing Data (한반도 바람지도 구축에 관한 연구 I. 원격탐사자료를 이용한 해상풍력자원 평가)

  • Kim Hyun-Goo;Lee H.W;Jung W.S
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.21 no.1
    • /
    • pp.63-72
    • /
    • 2005
  • In order to understand regional wind characteristics and to estimate offshore wind resources, a wind map of the Korean Peninsula was established using remote-sensing data from the satellite, U.S. NASA Quik SCAT which has been deployed for the Sea Winds Project since 1999. According to the linear regression result between the wind map data and in-situ marine-buoy data, the correlation factor was greatly improved up to 0.87 by blending the remote-sensing data of Quik SCAT with U.S. NCEP/NCAR CDAS reanalysis data to eliminate precipitation interference and to increase temporal resolution. It is found from the established wind map that the wind speed in winter is prominent temporally and the South Sea shows spatially high energy density over the wind class 6. The reason is deduced that the north-west winds through the Yellow Sea and the north-east winds through the East Sea derived by the low pressure developed in Japan are accelerated passing through the Korea Channel and formed high wind energy region in the South Sea; the same trends are confirmed from the statistical analysis of the meteorological observation data of KMA.

An Adaptive Hot-Spot Operating Scheme for OFDMA Downlink Systems in Vertically Overlaid Cellular Architecture

  • Kim, Nak-Myeong;Choi, Hye-Sun;Chung, Hee-Jeong
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.282-290
    • /
    • 2006
  • In vertically overlaid cellular systems, a temporary traffic concentration can occur in a hot-spot area, and this adversely affects overall system capacity. In this paper, we develop an adaptive hot-spot operating scheme (AHOS) to mitigate the negative effects from the nonuniform distribution of user location and the variation in the mixture of QoS requirements in orthogonal frequency division multiple access downlink systems. Here, the base station in a macrocell can control the operation of picocells within the cell, and turns them on or off according to the system overload estimation function. In order to determine whether the set of picocells is turned on or off, we define an AHOS gain index that describes the number of subcarriers saved to the macrocell by turning a specific picocell on. For initiating the picocell OFF procedure, we utilize the changes in traffic concentration and co-channel interference to the neighboring cells. According to computer simulation, the AHOS has been proved to have maximize system throughput while maintaining a very low QoS outage probability under various system scenarios in both a single-cell and multi-cell environments.

  • PDF