• Title/Summary/Keyword: Usage-based Rate

Search Result 414, Processing Time 0.028 seconds

PAPR Reduction Using Hybrid Schemes for Satellite Communication System

  • Kim, Jae-Moung;Zhao, Zibin;Li, Hao-Wei;Sohn, Sung-Hwan
    • Journal of Satellite, Information and Communications
    • /
    • v.3 no.2
    • /
    • pp.48-53
    • /
    • 2008
  • In the future, satellite communication systems, such as ISDB in Japan and DVB in Europe, are required to support higher transmission date rate for providing multimedia services including HDTV, high rate data communication etc. Considering the effectiveness of OFDM technique in efficient usage of frequency bandwidth and its robustness to the multi-path fading, several OFDM based standards have been proposed for satellite communication. However, the problem of high Peak to Average Power Ratio is one of the main obstacles for the implementation of OFDM based system. Many PAPR reduction schemes have been proposed for OFDM systems. Among these, the partial transmit sequences (PTS) is attractive as they obtain better PAPR property by modifying OFDM signals without distortion. In this paper, considering the complexity issue, we present a simplified minimum maximum (minimax) criterion and Sub-Optimal PTS algorithm to optimize the phase factor. This algorithm can be dynamically made tradeoff`f between performance and complexity on demand. In addition, we integrate guided scrambling (GS) with this method. Simulation in multiple antenna based OFDM system proves that the proposed Hybrid schemes can get much more PAPR reduction and do not require transmission of side information (SI). Thus it is helpful when implementing OFDM technique in satellite communication system.

  • PDF

Bandwidth-Efficient Precoding Scheme for Downlink Smart Utility Networks

  • Kim, Byung Wook
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.8
    • /
    • pp.1012-1019
    • /
    • 2014
  • The emerging smart utility networks (SUN) provide two-way communications between smart meters and smart appliances for purpose of low power usage, low cost, and high reliability. This paper deals with a bandwidth-efficient communication method based on the hidden pilot-aided scheme using a precoder in downlink SUN suitable for high-rate multimedia applications. With the aid of the design of a precoder and a superimposed hidden pilot, it is possible to estimate the channel without loss of bandwidth. In the channel estimation procedure, the inevitable data interference, which degrades the performance of channel estimation, can be reduced by the precoder design with an iterative scheme. Computer simulations show that the proposed scheme outperforms the conventional method in terms of achievable data rate, especially when a large number of subcarriers are employed.

MMMP: A MAC Protocol to Ensure QoS for Multimedia Traffic over Multi-hop Ad Hoc Networks

  • Kumar, Sunil;Sarkar, Mahasweta;Gurajala, Supraja;Matyjas, John D.
    • Journal of Information Processing Systems
    • /
    • v.4 no.2
    • /
    • pp.41-52
    • /
    • 2008
  • In this paper, we discuss a novel reservation-based, asynchronous MAC protocol called 'Multi-rate Multi-hop MAC Protocol' (MMMP) for multi-hop ad hoc networks that provides QoS guarantees for multimedia traffic. MMMP achieves this by providing service differentiation for multirate real-time traffic (both constant and variable bit rate traffic) and guaranteeing a bounded end-to-end delay for the same while still catering to the throughput requirements of non real time traffic. In addition, it administers bandwidth preservation via a feature called 'Smart Drop' and implements efficient bandwidth usage through a mechanism called 'Release Bandwidth'. Simulation results on the QualNet simulator indicate that MMMP outperforms IEEE 802.11 on all performance metrics and can efficiently handle a large range of traffic intensity. It also outperforms other similar state-of-the-art MAC protocols.

Area Efficient Implementation Of 128-Bit Block Cipher, SEED

  • Seo, Young-Ho;Kim, Jong-Hyeon;Jung, Young-Jin;Kim, Dong-Wook
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.339-342
    • /
    • 2000
  • This paper presented a FPGA design of SEED, which is the Korea standard 128-bit block cipher. In this work, SEED was designed technology- independently for other applications such as ASIC or core-based designs. Hence in case of changing the target of design, it is not necessary to modify design or need only minor modification to reuse the design. Since SEED algorithm requires a lot of hardware resources, each unit was designed only once and used sequentially. So, the number of gates was minimized and SEED algorithm was fitted in FPGA without additional components. It was confirmed that the rate of resource usage is about 80% in ALTERA 10KE and the SEED design operates in a clock frequency of 131.57 MHz and an encryption rate of 29 Mbps.

  • PDF

Study of Several Silica Properties Influence on Sapphire CMP

  • Wang, Haibo;Zhang, Zhongxiang;Lu, Shibin
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.2
    • /
    • pp.886-891
    • /
    • 2018
  • Colloid silica using as abrasive for polishing sapphire has been extensively studied, which mechanism has also been deeply discussed. However, by the requirement of application enlargement and cost reduction, some new problems appear such as silica service life time, particle diameter mixing, etc. In this paper, several influences of colloid silica usage on sapphire CMP are examined. Results show particle diameter and concentration, pH value, service life time, particle diameter mixing heavily influence removal rate. Further analysis discloses there are two main effect aspects which are quantity of hydroxyl group, contact area for abrasive density stacking between abrasive and sapphire. Based on the discussions, a dynamic process of sapphire polishing is proposed.

Hybrid Fuzzy Adaptive Wiener Filtering with Optimization for Intrusion Detection

  • Sujendran, Revathi;Arunachalam, Malathi
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.502-511
    • /
    • 2015
  • Intrusion detection plays a key role in detecting attacks over networks, and due to the increasing usage of Internet services, several security threats arise. Though an intrusion detection system (IDS) detects attacks efficiently, it also generates a large number of false alerts, which makes it difficult for a system administrator to identify attacks. This paper proposes automatic fuzzy rule generation combined with a Wiener filter to identify attacks. Further, to optimize the results, simplified swarm optimization is used. After training a large dataset, various fuzzy rules are generated automatically for testing, and a Wiener filter is used to filter out attacks that act as noisy data, which improves the accuracy of the detection. By combining automatic fuzzy rule generation with a Wiener filter, an IDS can handle intrusion detection more efficiently. Experimental results, which are based on collected live network data, are discussed and show that the proposed method provides a competitively high detection rate and a reduced false alarm rate in comparison with other existing machine learning techniques.

Privacy Inferences and Performance Analysis of Open Source IPS/IDS to Secure IoT-Based WBAN

  • Amjad, Ali;Maruf, Pasha;Rabbiah, Zaheer;Faiz, Jillani;Urooj, Pasha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.1-12
    • /
    • 2022
  • Besides unexpected growth perceived by IoT's, the variety and volume of threats have increased tremendously, making it a necessity to introduce intrusion detections systems for prevention and detection of such threats. But Intrusion Detection and Prevention System (IDPS) inside the IoT network yet introduces some unique challenges due to their unique characteristics, such as privacy inference, performance, and detection rate and their frequency in the dynamic networks. Our research is focused on the privacy inferences of existing intrusion prevention and detection system approaches. We also tackle the problem of providing unified a solution to implement the open-source IDPS in the IoT architecture for assessing the performance of IDS by calculating; usage consumption and detection rate. The proposed scheme is considered to help implement the human health monitoring system in IoT networks

Identification of Visitation Density and Critical Management Area Regarding Marine Spatial Planning: Applying Social Big Data (해양공간계획 수립을 위한 방문밀집도 및 중점관리지역 규명: 소셜 빅데이터를 활용하여)

  • Kim, Yoonjung;Kim, Choongki;Kim, Gangsun
    • Journal of Environmental Impact Assessment
    • /
    • v.29 no.2
    • /
    • pp.122-131
    • /
    • 2020
  • Marine Spatial Planning is an emerging strategy that promoting sustainable development at coastal and marine areas based on the concept of ecosystem services. Regarding its methodology, usage rate of resources and its impact should be considered in the process of spatial planning. Particularly, considering the rapid increase of coastal tourism, visitation pattern is required to be identified across coastal areas. However, actions to quantify visitation pattern have been limited due to its required high cost and labor for conducting extensive field-study. In this regard, this study aimed to pose the usage of social big data in Marine Spatial Planning to identify spatial visitation density and critical management zone throughout coastal areas. We suggested the usage of GPS information from Flickr and Twitter, and evaluated the critical management zone by applying spatial statistics and density analysis. This study's results clearly showed the coastal areas having relatively high visitors in the southern sea of South Korea. Applied Flickr and Twitter information showed high correlation with field data, when proxy excluding over-estimation was applied and appropriate grid-scale was identified in assessment approach. Overall, this study offers insights to use social big data in Marine Spatial Planning for reflecting size and usage rate of coastal tourism, which can be used to designate conservation area and critical zones forintensive management to promote constant supply of cultural services.

Web Prefetching Scheme for Efficient Internet Bandwidth Usage (효율적인 인터넷 대역폭 사용을 위한 웹 프리페칭 기법)

  • Kim, Suk-Hyang;Hong, Won-Gi
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.3
    • /
    • pp.301-314
    • /
    • 2000
  • As the number of World Wide Web (Web) users grows, Web traffic continues to increase at an exponential rate. Currently, Web traffic is one of the major components of Internet traffic. Also, high bandwodth usage due to Web traffic is observed during peak periods while leaving bandwidth usage idle during off-peak periods. One of the solutions to reduce Web traffic and speed up Web access is through the use of Web caching. Unfortunately, Web caching has limitations for reducing network bandwidth usage during peak periods. In this paper, we focus our attention on the use of a prefetching algorithm for reducing bandwidth during peak periods by using off-peak period bandwidth. We propose a statistical, batch, proxy-side prefetching scheme that improves cache hit rate while only requiring a small amount of storage. Web objects that were accessed many times in previous 24 hours but would be expired in the next 24 hours, are selected and prefetched in our scheme. We present simulation results based on Web proxy and show that this prefetching algorithm can reduce peak time bandwidth using off-peak bandwidth.

  • PDF

A LOW-COST PROTOCOL IN SENSOR NETWORK UBIQUITOUS ENVIRONMENT

  • Lee Dong-heui;Cho Young-bok;Kim Dong-myung;Lee Sang-ho
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.766-769
    • /
    • 2005
  • In a ubiquitous environment made up of multiple sensors, most sensors participate in communications with limited battery, and the sensor node isn't able to participate in communications when all the battery is used up. When an existing authentication method is used for the sensor node which has to participate in a long term communication with limited battery, it creates a problem by making the length of network maintenance or sensor node's operation time relatively shorte. Therefore, a network structure where RM (Register Manager) node and AM (Authentication Manager) node are imported to solve the energy consumption problem during a communication process is presented in this thesis. This offers a low power protocol based on safety through a mutual authentication during communications. Through registration and authentication manager nodes, each sensor nodes are ensured of safety and the algorithm of key's generation, encryption/descramble and authentication is processed with faster operation speed. So the amount of electricity used up during the communications between sensor nodes has been evaluated. In case of the amount of electrical usage, an average of $34.783\%$ for the same subnet and 36.855 for communications with two different subnets, are reduced. The proposed method is a protocol which maintains the limited battery for a long time to increase the effectiveness of energy usage in sensor nodes and can also increase the participation rate of communication by sensor nodes.

  • PDF