• Title/Summary/Keyword: multi-user transmission

Search Result 199, Processing Time 0.028 seconds

Connection Management Scheme using Mobile Agent System

  • Lim, Hee-Kyoung;Bae, Sang-Hyun;Lee, Kwang-Ok
    • Journal of Integrative Natural Science
    • /
    • v.11 no.4
    • /
    • pp.192-196
    • /
    • 2018
  • The mobile agent paradigm can be exploited in a variety of ways, ranging from low-level system administration tasks to middle ware to user-level applications. Mobile agents can be useful in building middle-ware services such as active mail systems, distributed collaboration systems, etc. An active mail message is a program that interacts with its recipient using a multimedia interface, and adapts the interaction session based on the recipient's responses. The mobile agent paradigm is well suitable to this type of application, since it can carry a sender-defined session protocol along with the multimedia message. Mobile agent communication is possible via method invocation on virtual references. Agents can make synchronous, one-way, or future-reply type invocations. Multicasting is possible, since agents can be aggregated hierarchically into groups. A simple check-pointing facility has also been implemented. Another proposed solution is to use multi agent computer systems to access, filter, evaluate, and integrate this information. We will present the overall architectural framework, our agent design commitments, and agent architecture to enable the above characteristics. Besides, the each information needed a mobile agent system such as text, graphic, image, audio and video etc, constructed a great capacity multimedia database system. However, they have problems in establishing connections over multiple subnetworks, such as no end-to-end connections, transmission delay due to ATM address resolution, no QoS protocols. We propose a new connection management scheme in the thesis to improve the connection management involved of mobile agent systems.

Peer to Peer Search Algorithm based on Advanced Multidirectional Processing (개선된 다방향 프로세싱 기반 P2P 검색 알고리즘)

  • Kim, Boon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.133-139
    • /
    • 2009
  • A P2P technology in distributed computing fields is presented various methods to share resources between network connected peers. This is very efficient that a degree of resources to good use as compared with peers by using centralized network by a few servers. However peers to compose P2P system is not always online status, therefore it is difficult to support high reliability to user. In our previous work of this paper, it is contributing to reduce the loading rates to select of new resource support peer but a selection method the peers to share works to download resources is very simple that it is just selected about peer to have lowest job. In this paper, we reduced frequency offline peers by estimate based on a average value of success rates for peers.

A Vector Perturbation Based User Selection for Multi-antenna Downlink Channels (다중안테나 하향채널에서의 Vector Perturbation 기반 사용자 선택 기법)

  • Lee, Byung-Ju;Lim, Chae-Hee;Shim, Byong-Hyo
    • Journal of Broadcast Engineering
    • /
    • v.16 no.6
    • /
    • pp.977-985
    • /
    • 2011
  • Recent works on multiuser transmission techniques have shown that the linear growth of capacity in single user MIMO system can be translated to the multiuser MIMO scenario as well. In this paper, we propose a method pursuing performance gain of vector perturbation in multiuser downlink systems. Instead of employing maximum number of mobile users for communication, we use small part of them as virtual users for improving reliability of users participating communication. By controlling parameters of virtual users including information and perturbation vector, we obtain considerable improvement in the effective SNR, resulting in large gain in bit error rate performance. Simulation results on the realistic multiuser downlink systems show that the proposed method brings substantial performance gain over the standard vector perturbation with marginal overhead in computations.

Pilot Hopping Scheme for Massive Antenna Systems in Cellular Networks (극다중 안테나 셀룰러 시스템을 위한 파일럿 도약 기법)

  • Kim, Seong Hwan;Ban, Tae-Won;Lee, Wongsup;Ryu, Jong Yeol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.718-723
    • /
    • 2017
  • We propose a pilot hopping scheme that improves the limited system capacity due to pilot contamination in multi-cell environment with large-scale antenna arrays at a base station, assuming the infinite number of antennas. In the conventional fixed pilot scheme, each user obtains the same signal-to-interference ratio (SIR) over a long period of time. Therefore, a user with strong interference has continuously low SIR which degrades its service quality. In the proposed pilot hopping scheme, different pilot signals are used for each time slot, and different amounts of interference are received every time. When such a pilot hopping technique is applied, the SIR fluctuates at every time slot. When the Hybrid Automatic Repeat & reQuest (HARQ) technique is applied in such a channel, the outage probability and transmission rate are improved. We show that there is the performance gain of the proposed scheme over the conventional scheme through computer simulations.

Soft Load Balancing Using the Load Sharing Over Heterogeneous Wireless Networks (이기종 무선 환경에서 Load sharing을 이용한 Soft Load Balancing 기술)

  • Son, Hyuk-Min;Lee, Sang-Hoon;Kim, Soo-Chang;Shin, Yeon-Seung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.7A
    • /
    • pp.757-767
    • /
    • 2008
  • Start Ongoing next generation networks are expected to be deployed over current existing networks, in the form of overlayed heterogeneous networks, in particular, in hot spot areas. Therefore, it will be necessary to develop an interworking technique such as load balancing, to achieve increased overall resource utilization in the various heterogeneous networks. In this paper, we present a new load balancing mechanism termed 'soft' load balancing where the IP(Internet Protocol) traffic of a user is divided into sub-traffic, each of which flows into a different access network. The terminology of soft load balancing involves the use of both load sharing and handover techniques. Through a numerical analysis, we obtain an optimal LBR (Load Balancing Ratio) for determining the volume of traffic delivered to each network over an overlayed multi-cell environment. Using the optimal LBR, a more reliable channel transmission can be achieved by reducing the outage probability efficiently for a given user traffic.

A Space Division Multiple Access Technique for Downlink MIMO Systems (하향링크 MIMO 시스템을 위한 공간분할 다중접속 기술)

  • Rim, Min-Joong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9A
    • /
    • pp.1022-1030
    • /
    • 2004
  • The next generation cellular radio systems require high data rate transmission and large system capacity In order to meet these requirements, multiple antennas can be used at the base and mobile stations, forming MIMO(multiple-input, multiple-output) channels This paper considers a downlink MIMO system assuming a large number of base station antennas, a small number of mobile station antennas, and rich-scattering, quasi-stationary, and flat-fading channel environments When the channel state information is given at the base station in a single user system, a MIMO technique with SVD(singular value decomposition) and water-filling can achieve the maximal downlink channel capacity. In multi-user environments, however, SDMA(space division multiple acces) technique can be used to further increase the total channel capacity supported by the base station This paper proposes a MIMO SDMA technique which can transmit parallel data streams to each of multiple users. The proposed method. can achieve higher total channel capacity than SVD-based MIMO techniques or conventional SDMA using smart antennas.

Antenna Placement Designs for Distributed Antenna Systems with Multiple-Antenna Ports (다중 안테나 포트를 장착한 분산 안테나 시스템에서의 안테나 설계 방법)

  • Lee, Changhee;Park, Eunsung;Lee, Inkyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.10
    • /
    • pp.865-875
    • /
    • 2012
  • In this paper, we optimize antenna locations for a distributed antenna system (DAS) with distributed antenna (DA) ports equipped with multiple antennas under per-DA port power constraint. Maximum ratio transmission and scaled zero-forcing beamforming are employed for single-user and multi-user DAS, respectively. Instead of maximizing the cell average ergodic sum rate, we focus on a lower bound of the expected signal-to-noise ratio (SNR) for the single-cell scenario and the expected signal-to-leakage ratio (SLR) for the two-cell scenario to determine antenna locations. For the single-cell case, optimization of the SNR criterion generates a closed form solution in comparison to conventional iterative algorithms. Also, a gradient ascent algorithm is proposed to solve the SLR criterion for the two-cell scenario. Simulation results show that DAS with antenna locations obtained from the proposed algorithms achieve capacity gains over traditional centralized antenna systems.

An Interference Coordination Technique Utilizing Sub-Arrays and Its Performance in Cellular Systems (부 어레이 빔포밍을 활용하는 간섭 제어 기법 및 셀룰러 시스템에서의 성능 평가)

  • Kang, Hosik;Lee, Donghyun;Sung, Wonjin
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.6
    • /
    • pp.653-663
    • /
    • 2014
  • To cope with an increasing amount of data traffic, research efforts are being made to maximize the data rate by reducing the interference between the transmission nodes. This paper also focuses on interference control schemes utilizing antenna sub-array beam-forming. The first scheme relies on horizontal beam rotation which utilizes three types of narrow beam patterns. Different beam patterns are applied to transmit signals in rotating fashion to control the interference. The second scheme is based on user-specific sub-array beamforming, which uses the precoding matrix based on users' location and controls the amount of interference in the multi-user environment. The performance of the proposed schemes is evaluated using the computer simulation to demonstrate the performance enhancement.

Design of an Algorithm for the Validation of SCL in Digital Substations

  • Jang, B.T.;Alidu, A.;Kim, N.D.
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.3 no.2
    • /
    • pp.89-97
    • /
    • 2017
  • The substation is a critical node in the power network where power is transformed in the power generation, transmission and distribution system. The IEC 61850 is a global standard which proposes efficient substation automation by defining interoperable communication and data modelling techniques. In order to achieve this level of interoperability and automation, the IEC 61850 (Part 6) defines System Configuration description Language (SCL). The SCL is an XML based file format for defining the abstract model of primary and secondary substation equipment, communications systems and also the relationship between them. It enables the interoperable exchange of data during substation engineering by standardizing the description of applications at different stages of the engineering process. To achieve the seamless interoperability, multi-vendor devices are required to adhere completely to the IEC 61850. This paper proposes an efficient algorithm required for verifying the interoperability of multi-vendor devices by checking the adherence of the SCL file to specifications of the standard. Our proposed SCL validation algorithm consists of schema validation and other functionalities including information model validation using UML data model, the Vendor Defined Extension model validation, the User Defined Rule validation and the IED Engineering Table (IET) consistency validation. It also integrates the standard UCAIUG (Utility Communication Architecture International Users Group) Procedure validation for quality assurance testing. Our proposed algorithm is not only flexible and efficient in terms of ensuring interoperable functionality of tested devices, it is also convenient for use by system integrators and test engineers.

A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption

  • Muhammad, Khan;Ahmad, Jamil;Farman, Haleem;Jan, Zahoor;Sajjad, Muhammad;Baik, Sung Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1938-1962
    • /
    • 2015
  • Security of information during transmission is a major issue in this modern era. All of the communicating bodies want confidentiality, integrity, and authenticity of their secret information. Researchers have presented various schemes to cope with these Internet security issues. In this context, both steganography and cryptography can be used effectively. However, major limitation in the existing steganographic methods is the low-quality output stego images, which consequently results in the lack of security. To cope with these issues, we present an efficient method for RGB images based on gray level modification (GLM) and multi-level encryption (MLE). The secret key and secret data is encrypted using MLE algorithm before mapping it to the grey-levels of the cover image. Then, a transposition function is applied on cover image prior to data hiding. The usage of transpose, secret key, MLE, and GLM adds four different levels of security to the proposed algorithm, making it very difficult for a malicious user to extract the original secret information. The proposed method is evaluated both quantitatively and qualitatively. The experimental results, compared with several state-of-the-art algorithms, show that the proposed algorithm not only enhances the quality of stego images but also provides multiple levels of security, which can significantly misguide image steganalysis and makes the attack on this algorithm more challenging.