• Title/Summary/Keyword: Secondary Information

Search Result 2,056, Processing Time 0.044 seconds

A Study on the Indexing System Using a Controlled Vocabulary and Natural Language in the Secondary Legal Information Full-Text Databases : an Evaluation and Comparison of Retrieval Effectiveness (2차 법률정보 전문데이터베이스에 있어서 통제어 색인시스템과 자연어 색인시스템의 검색효율 평가에 관한 연구)

  • Roh Jeong-Ran
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.32 no.4
    • /
    • pp.69-86
    • /
    • 1998
  • The purpose of velop the indexing algorithm of secondary legal information by the study of characteristics of legal information, to compare the indexing system using controlled vocabulary to the indexing system using natural language in the secondary legal information full-text databases, and to prove propriety and superiority of the indexing system using controlled vocabulary. The results are as follows; 1)The indexing system using controlled vocabulary in the secondary legal information full-text databases has more effectiveness than the indexing system using natural language, in the recall rate, the precision rate, the distribution of propriety, and the faculty of searching for the unique proper-records which the indexing system using natural language fans to find 2)The indexing system which adds more words to the controlled vocabulary in the secondary legal information full-text databases does not better effectiveness in the retail rate, the precision rate, comparing to the indexing system using controlled vocabulary. 3)The indexing system using word-added controlled vocabulary with an extra weight in the secondary legal information full-text databases does not better effectiveness in the recall rate, the precision rate, comparing to the indexing system using word-added controlled vocabulary without an extra weight. This study indicates that it is necessary to have characteristic information the information experts recognize - that is to say, experimental and inherent knowledge only human being can have built-in into the system rather than to approach the information system by the linguistic, statistic or structuralistic way, and it can be more essential and intelligent information system.

  • PDF

Interference Cancellation Scheme for Three-hop Cooperative Relay Networks

  • Zhang, Yinghua;Wang, Lei;Liu, Jian;Peng, Yunfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4446-4462
    • /
    • 2019
  • In this paper, we focus on interference cancellation for three-hop cognitive radio networks (CRNs) over Rayleigh fading channels. In CRNs, secondary users (SUs) are allowed to opportunistically utilize the licensed spectrum during the idle time of primary users (PUs) to achieve spectrum sharing. However, the SUs maybe power constrained to avoid interference and cover a very short transmission range. We here propose an interference cancellation scheme (ICS) for three-hop CRNs to prolong the transmission range of SUs and improve their transmission efficiency. In the proposed scheme, a flexible transmission protocol is adopted to cancel the interference at both secondary relays and destinations at the same time. And a closed-form expression for the secondary outage probability over Rayleigh fading channels is derived to measure the system performance. Simulation results show that the proposed scheme can significantly reduce the secondary outage probability and increase the secondary diversity in comparison with the traditional cases.

On Performance Evaluation of Hybrid Decode-Amplify-Forward Relaying Protocol with Partial Relay Selection in Underlay Cognitive Networks

  • Duy, Tran Trung;Kong, Hyung Yun
    • Journal of Communications and Networks
    • /
    • v.16 no.5
    • /
    • pp.502-511
    • /
    • 2014
  • In this paper, we evaluate performance of a hybrid decode-amplify-forward relaying protocol in underlay cognitive radio. In the proposed protocol, a secondary relay which is chosen by partial relay selection method helps a transmission between a secondary source and a secondary destination. In particular, if the chosen relay decodes the secondary source's signal successfully, it will forward the decoded signal to the secondary destination. Otherwise, it will amplify the signal received from the secondary source and will forward the amplified signal to the secondary destination. We evaluate the performance of our scheme via theory and simulation. Results show that the proposed protocol outperforms the amplify-and-forward and decode-and-forward protocols in terms of outage probability.

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

A Performance Comparison of Protein Profiles for the Prediction of Protein Secondary Structures (단백질 이차 구조 예측을 위한 단백질 프로파일의 성능 비교)

  • Chi, Sang-Mun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.26-32
    • /
    • 2018
  • The protein secondary structures are important information for studying the evolution, structure and function of proteins. Recently, deep learning methods have been actively applied to predict the secondary structure of proteins using only protein sequence information. In these methods, widely used input features are protein profiles transformed from protein sequences. In this paper, to obtain an effective protein profiles, protein profiles were constructed using protein sequence search methods such as PSI-BLAST and HHblits. We adjust the similarity threshold for determining the homologous protein sequence used in constructing the protein profile and the number of iterations of the profile construction using the homologous sequence information. We used the protein profiles as inputs to convolutional neural networks and recurrent neural networks to predict the secondary structures. The protein profile that was created by adding evolutionary information only once was effective.

Cognitive Radio Based Spectrum Sharing: Evaluating Channel Availability via Traffic Pattern Prediction

  • Li, Xiukui;Zekavat, Seyed A. (Reza)
    • Journal of Communications and Networks
    • /
    • v.11 no.2
    • /
    • pp.104-114
    • /
    • 2009
  • In this paper, a technique is proposed that enables secondary users to evaluate channel availability in cognitive radio networks. Here, secondary users estimate the utilization of channels via predicting the traffic pattern of primary user, and select a proper channel for radio transmission. The proposed technique reduces the channel switching rate of secondary users (the rate of switching from one channel to another) and the interference on primary users, while maintaining a reasonable call blocking rate of secondary users.

Resource Allocation with Proportional Rate In Cognitive Wireless Network: An Immune Clonal Optimization Scheme

  • Chai, Zheng-Yi;Zhang, De-Xian;Zhu, Si-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1286-1302
    • /
    • 2012
  • In this paper, the resource allocation problem with proportional fairness rate in cognitive OFDM-based wireless network is studied. It aims to maximize the total system throughput subject to constraints that include total transmit power for secondary users, maximum tolerable interferences of primary users, bit error rate, and proportional fairness rate among secondary users. It is a nonlinear optimization problem, for which obtaining the optimal solution is known to be NP-hard. An efficient bio-inspired suboptimal algorithm called immune clonal optimization is proposed to solve the resource allocation problem in two steps. That is, subcarriers are firstly allocated to secondary users assuming equal power assignment and then the power allocation is performed with an improved immune clonal algorithm. Suitable immune operators such as matrix encoding and adaptive mutation are designed for resource allocation problem. Simulation results show that the proposed algorithm achieves near-optimal throughput and more satisfying proportional fairness rate among secondary users with lower computational complexity.

Relationship between Secondary Electron Emissions and Film Thickness of Hydrogenated Amorphous Silicon

  • Yang, Sung-Chae;Chu, Byung-Yoon;Ko, Seok-Cheol;Han, Byoung-Sung
    • KIEE International Transactions on Electrophysics and Applications
    • /
    • v.4C no.4
    • /
    • pp.185-189
    • /
    • 2004
  • The temporal variation of a secondary electron emission coefficient (${\gamma}$ coefficient) of hydrogenated amorphous silicon (a-Si:H) was investigated in a dc silane plasma. Estimated ${\gamma}$ coefficients have a value of 2.73 ${\times}$ 10$^{-2}$ on the pure aluminum electrode and 1.5 ${\times}$ 10$^{-3}$ after 2 hours deposition of -Si:H thin films on a cathode. It showed an abrupt decrease for about 30 minutes before saturation. The variation of the ${\gamma}$ coefficient was estimated as a function of the thin film thickness, and the film thickness was about 80 nm after 30 minutes deposition time. These results are compared with the results of a computer simulation for ion penetration into a cathode.

Two-Stage Spectrum Sensing Scheme Using Fuzzy Logic for Cognitive Radio Networks

  • Satrio, Cahyo Tri;Jaeshin, Jang
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.1
    • /
    • pp.1-8
    • /
    • 2016
  • Spectrum sensing in cognitive radio networks allows secondary users to sense the unused spectrum without causing interference to primary users. Cognitive radio requires more accurate sensing results from unused portions of the spectrum. Accurate spectrum sensing techniques can reduce the probability of false alarms and misdetection. In this paper, a two-stage spectrum sensing scheme is proposed for cooperative spectrum sensing in cognitive radio networks. In the first stage, spectrum sensing is executed for each secondary user using energy detection based on double adaptive thresholds to determine the spectrum condition. If the energy value lies between two thresholds, a fuzzy logic scheme is applied to determine the channel conditions more accurately. In the second stage, a fusion center combines the results of each secondary user and uses a fuzzy logic scheme for combining all decisions. The simulation results show that the proposed scheme provides increased sensing accuracy by about 20% in some cases.

Sequential Optimization for Subcarrier Pairing and Power Allocation in CP-SC Cognitive Relay Systems

  • Liu, Hongwu;Jung, Jaijin;Kwak, Kyung Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1638-1653
    • /
    • 2014
  • A sequential optimization algorithm (SOA) for resource allocation in a cyclic-prefixed single-carrier cognitive relay system is proposed in this study. Both subcarrier pairing (SP) and power allocation are performed subject to a primary user interference constraint to minimize the mean squared error of frequency-domain equalization at the secondary destination receiver. Under uniform power allocation at the secondary source and optimal power allocation at the secondary relay, the ordered SP is proven to be asymptotically optimal in maximizing the matched filter bound on the signal-to-interference-plus-noise ratio. SOA implements the ordered SP before power allocation optimization by decoupling the ordered SP from the power allocation. Simulation results show that SOA can optimize resource allocation efficiently by significantly reducing complexity.