• Title/Summary/Keyword: relay control

Search Result 480, Processing Time 0.025 seconds

SoQ-based Relay Transmission Protocol for Wireless USB over WiMedia D-MAC (WiMedia D-MAC 기반 Wireless USB 시스템을 위한 SoQ-based 릴레이 통신 프로토콜)

  • Hur, Kyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1324-1329
    • /
    • 2013
  • The WiMedia Alliance has specified a Distributed Medium Access Control (D-MAC) protocol based on UWB for high speed wireless home networks and WPANs. In this paper, firstly, the fair SoQ-based Distributed Reservation Protocol (DRP) for D-MAC is analyzed. And a novel SoQ-based relay transmission protocol is proposed to overcome DRP conflicts fast. In the proposed protocol, each device executes the Satisfaction of QoS (SoQ) time slot allocation algorithm independently. And, in order to give the loser device due to DRP conflicts another chance to maintain QoS resources, the proposed relay transmission protocol helps the device reserve another indirect link maintaining the required QoS resources via a relay node.

A Study on Relay Enhancing Method of MIL-STD-188-220 using ACK Reply in CNR Network (Ack 응답을 이용한 MIL-STD-188-220의 중계전송 성능향상에 관한 연구)

  • Choi, Young-Min;Sung, Bo Hyon;Youn, Jong Taek;Kim, Young-Ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.5
    • /
    • pp.635-642
    • /
    • 2012
  • The Packet radio C2OTM(Command and Control On The Move) for Command, Control and situational awareness in communication environment of current Combat Net Radio Network is required in a relay transmission techniques. This is to assure the reliability of information transfer, and extend Wireless Coverage and overcome Communication obstacles of mountainous terrain. For the reliability of information transmission in tactical environment, Ad hoc Networking is necessary considering communication environment and an appropriate application of error correction. In this study, We propose a on-demand SDR algorithm that is currently being applied the FEC, Golay, Repetition Code. This enhanced relay transfer uses Ack Reply in tactical operating environment of MIL-STD-188-220 Protocol.

Physical Layer Security of AF Relay Systems With Jamming.

  • Ofori-Amanfo, Kwadwo Boateng;Lee, Kyoung-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.288-289
    • /
    • 2019
  • This paper studies the secrecy capacity for a wireless cooperative network with perfect channel state information at the relays, and receiver. A similar assumption is also made for the instance where there exist a direct link between the transmitter and receiver. Physical Layer security techniques are employed in wireless networks to mitigate against the activity of eavesdroppers. It offers a viable alternative to computationally intensive encryption. In this paper the design of a protocol utilizing jamming (via jamming nodes) for better security and relaying (via relay nodes) for the amplify-and-forward (AF) operation, is investigated. A a signal-to-noise variant of secrecy known as secrecy gap is explored because of its use of lesser computational power - preferable for practical systems. Thus we maximize this signal-to-noise approach instead of the conventional secrecy capacity maximization method. With this, an iterative algorithm using geometric programming (GP) and semi-definite programming (SDP) is presented with appreciable benefits. The results show here highlight the benefits of using fractional components of the powers of the relays to offer better secrecy capacity.

  • PDF

Control Methods for Operation on the Saturation Edge (포화시작점에서의 운전을 위한 제어방법)

  • Ahn, Gwang Noh;Lim, Sanghun;Sung, Su Whan;Lee, Jietae
    • Korean Chemical Engineering Research
    • /
    • v.58 no.3
    • /
    • pp.390-395
    • /
    • 2020
  • For some processes with saturations, economical operating points are on the saturation edges. Traditional feedback controllers cannot be used to regulate such processes on the saturation edges because there are abrupt dynamics changes and no feedback information at saturations. Optimization-based methods such as the model predictive control can treat this control problem without difficulty when the saturation levels and dynamics are known and not varying. Otherwise, an adaptation scheme to track the saturation levels and dynamics should be included. Here, for very simple methods to treat this control problem, two control methods based on the recent slope seeking method and the relay feedback method are proposed. Their performances are evaluated with simulations applying them to a second order liquid level system with saturation. Simulations show that these proposed control methods can find and maintain operating point of the saturation edge under 5% relative error.

Farthest-k relay selection algorithm for efficient D2D message dissemination (효율적인 D2D 메시지 확산을 위한 최외곽 k개의 릴레이 선택 알고리즘)

  • Han, Seho;Lee, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.3
    • /
    • pp.543-548
    • /
    • 2017
  • In the conventional algorithm, the D2D message dissemination algorithm based on the Epidemic routing protocol frequently causes a problem of duplication of the received messages due to the overlaps of D2D transmission coverages. It is because all D2D devices that receive the messages perform relaying the message replicas to other D2D devices within their transmission range. Therefore, we herein propose the farthest-k relay selection algorithm to mitigate this message duplication problem. In the farthest-k relay selection algorithm, less than k devices within the D2D transmission range perform message relay. Furthermore, we perform comparative performance analysis between the conventional D2D data dissemination algorithm and our farthest-k relay selection algorithm. By using intensive MATLAB simulations we prove the performance excellency of our farthest-k relay algorithm compared with the conventional algorithm with respect to coverage probability, the total number of initially and duplicately received messages, and transmission efficiency.

Secure Communication in Multiple Relay Networks Through Decode-and-Forward Strategies

  • Bassily, Raef;Ulukus, Sennur
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.352-363
    • /
    • 2012
  • In this paper, we study the role of cooperative relays to provide and improve secure communication rates through decodeand-forward (DF) strategies in a full-duplex multiple relay network with an eavesdropper. We consider the DF scheme as a basis for cooperation and propose several strategies that implement different versions of this scheme suited for cooperation with multiple relays. Our goal is to give an efficient cooperation paradigm based on the DF scheme to provide and improve secrecy in a multiple relay network. We first study the DF strategy for secrecy in a single relay network. We propose a suboptimal DF with zero forcing (DF/ZF) strategy for which we obtain the optimal power control policy. Next, we consider the multiple relay problem. We propose three different strategies based on DF/ZF and obtain their achievable secrecy rates. The first strategy is a single hop strategy whereas the other two strategies are multiple hop strategies. In the first strategy, we show that it is possible to eliminate all the relays' signals from the eavesdropper's observation (full ZF), however, the achievable secrecy rate is limited by the worst source-relay channel. Our second strategy overcomes the drawback of the first strategy, however, with the disadvantage of enabling partial ZF only. Our third strategy provides a reasonable compromise between the first two strategies. That is, in this strategy, full ZF is possible and the rate achieved does not suffer from the drawback of the first strategy. We conclude our study by a set of numerical results to illustrate the performance of each of the proposed strategies in terms of the achievable rates in different practical scenarios.

A Study on The Development and Function Test of Digital Transformer Protection Relay Using The Induced Voltage (유기전압비를 이용한 디지털형 변압기 보호계전기 개발 및 성능시험에 관한 연구)

  • Jung, Sung-Kyo;Lee, Jae-Kyung;Kim, Han-Do;Choi, Dae-Gil;Kang, Yong-Chul;Kang, Sang-Hee
    • Proceedings of the KIEE Conference
    • /
    • 2001.11b
    • /
    • pp.216-218
    • /
    • 2001
  • The transformer role is very important in power system operation and control; also its price is very expensive. Therefore many kinds of the efforts for transformer protection have been executed. So for as, current differential relay(87) has been mainly used for transformer protection. But current differential relaying method has several troubles as followings. Differential current can be occurred by transformers inrush current between winding1 and winding2 of transformer when transformer is initially energized. Also harmonic restrained element used in current differential relaying method is one of the causes of relays mal-operation because recently harmonics in power system gradually increase by power switching devices(SVC, FACTS, DSC, etc). Therefore many kinds of effort have been executed to solve the trouble of current differential relay and one of them is method using ratio of increment of flux linkages(RIFL) of the primary and secondary windings. This paper introduces a novel protective relay for power transformers using RIFL of the primary and secondary windings. Novel protective relay successfully discriminates between transformer internal faults and normal operation conditions including inrush and this paper includes real time test results using RTDS(Real Time Digital Simulator) for novel protective relay. A novel protective relay was designed using the TMS320C32 digital signal processor and consisted of DSP module. A/D converter module, DI/DO module, MMI interface module and LCD display module and developed by Xelpower co., Ltd.

  • PDF

Optimization of Coverage Extension in OFDMA Based MMR System (OFDMA 방식을 사용하는 MMR시스템의 최적화된 커버리지 확장)

  • Kim, Seung-Yeon;Kim, Se-Jin;Ryu, Seung-Wan;Lee, Hyong-Woo;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.7B
    • /
    • pp.567-574
    • /
    • 2008
  • In this paper, we propose an optimal coverage extension scheme in the OFDMA based mobile multi-hop relay system. First, we propose an optimal frequency and time assignment scheme for maximizing system throughput and analyze the frame efficiency of schemes. Then, under the given BS capacity, we find the maximum number of relay hops that can be used to estimate the maximum coverage area of a BS in a multi-hop relay system. Analytical results show that the proposed scheme is efficient in coverage extension and throughput maximization in OFDMA based multi-hop relay system. Our work may be a rough guideline to control the parameters for multi-hop relay system optimization.

Semi-Analytical Averaged Error Rate Evaluation for DSF-Relay MC-CDMA systems over Multipath Rayleigh Fading Channels (다중경로 레일리 페이딩 채널에 대한 DSF 릴레이 MC-CDMA 시스템의 평균 오류율 의사 분석 기법)

  • Ko, Kyun-Byoung
    • Journal of IKEEE
    • /
    • v.16 no.2
    • /
    • pp.138-144
    • /
    • 2012
  • In this paper, a semi-analytical approach is proposed for DSF(Decode and Selective Forward)-Relay MC-CDMA(MultiCarrier-Code Division Multiple Access) systems over multipath Rayleigh fading channels. Considering BER(bit error rate) performance and complexity, the MMSE-C(Minimum Mean squared Error-per subCarrier) is used as the combining method for MC-CDMA systems. At first, the analytical method based on error-events at relay nodes for DSF-Relay schemes is utilized in order to derive the averaged BER. Then, the averaged BER is expressed as the form considering possible all error-events. Also, proposed semi-analytical expressions have been verified by comparing with simulation results. Finally, it is verified that the derived analytical expressions can be a frame work to cover different multipath Rayleigh fading channel conditions and to measure the upper performance for DSF-Relay MC-CDMA systems.

WAETER LEVEL CONTROL USING Z-80 MICROOMPUTER

  • Sugisaka, Masanori
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10b
    • /
    • pp.1899-1903
    • /
    • 1991
  • This paper presents a water level control method using Z-80 microcomputer. The process considered in this paper is one tank system which is described by an unknown nonlinear differential equation. The water level is measured by the end of bar installed at a float passing through 8 pair of photointerrupters located at equal distance. Therefore, the input data to 8255 which is interface between Z-80 and photointerrupters is discrete value, namely, value under 1. values from 1 to 8, and value upper 8. The water is pumped into the tank from a reservoir by switching on a relay connected to a moter and pump driving system. The pumping is stopped by switching off the relay. Experimental studies for two types of controllers are performed in order to investigate the control performance of water level of the water pumping system.

  • PDF