• 제목/요약/키워드: secondary data transmission

검색결과 63건 처리시간 0.026초

Triple-state 보상 함수를 기반으로 한 개선된 DSA 기법 (An Improved DSA Strategy based on Triple-States Reward Function)

  • 타사미아;구준롱;장성진;김재명
    • 대한전자공학회논문지TC
    • /
    • 제47권11호
    • /
    • pp.59-68
    • /
    • 2010
  • 본 논문은 보상함수 수정을 통해 보다 완벽한 DSA(Dynamic Spectrum Access)를 수행하는 새로운 방법을 제시하였다. POMDP(Partially Observable Markov Decision Process)는 미래의 스펙트럼 상태를 예측하는데 사용되는 알고리즘으로서, 그 중 보상함수는 스펙트럼을 예측하는데 있어 가장 중요한 부분이다. 그러나 보상함수는 Busy 및 Idle의 두 가지 상태만 갖고 있기 때문에 채널에서 충돌이 발생하게 되면 보상함수는 Busy를 반환함으로써 2차 사용자의 성능을 감소시키게 된다. 따라서 본 논문에서는 기존의 Busy를 Busy 및 Collision 의 두 상태로 구분하였고, 이렇게 추가된 Collision 상태를 통해 2차 사용자의 채널 접근 기회를 보다 향상시킴으로서 데이터 전송율을 증대시킬 수 있도록 하였다. 또한 본 논문은 새로운 알고리즘의 신뢰도 벡터를 수학적으로 분석하였다. 마지막으로 시뮬레이션 결과를 통해 개선된 보상함수의 성능을 검증하고, 이를 통해 새로운 알고리즘이 CR 네트워크에서 2차 사용자의 성능을 향상시킬 수 있음을 보인다.

Two-Dimensional POMDP-Based Opportunistic Spectrum Access in Time-Varying Environment with Fading Channels

  • Wang, Yumeng;Xu, Yuhua;Shen, Liang;Xu, Chenglong;Cheng, Yunpeng
    • Journal of Communications and Networks
    • /
    • 제16권2호
    • /
    • pp.217-226
    • /
    • 2014
  • In this research, we study the problem of opportunistic spectrum access (OSA) in a time-varying environment with fading channels, where the channel state is characterized by both channel quality and the occupancy of primary users (PUs). First, a finite-state Markov channel model is introduced to represent a fading channel. Second, by probing channel quality and exploring the activities of PUs jointly, a two-dimensional partially observable Markov decision process framework is proposed for OSA. In addition, a greedy strategy is designed, where a secondary user selects a channel that has the best-expected data transmission rate to maximize the instantaneous reward in the current slot. Compared with the optimal strategy that considers future reward, the greedy strategy brings low complexity and relatively ideal performance. Meanwhile, the spectrum sensing error that causes the collision between a PU and a secondary user (SU) is also discussed. Furthermore, we analyze the multiuser situation in which the proposed single-user strategy is adopted by every SU compared with the previous one. By observing the simulation results, the proposed strategy attains a larger throughput than the previous works under various parameter configurations.

Taxonomic study of three new Antarctic Asterochloris (Trebouxiophyceae) based on morphological and molecular data

  • Kim, Jong Im;Kim, Yong Jun;Nam, Seung Won;So, Jae Eun;Hong, Soon Gyu;Choi, Han-Gu;Shin, Woongghi
    • ALGAE
    • /
    • 제35권1호
    • /
    • pp.17-32
    • /
    • 2020
  • Asterochloris is one of the most common genera of lichen phycobionts in Trebouxiophyceae. Asterochloris phycobionts associated with the lichenized fungi Cladonia and Stereocaulon in King George Island (Antarctica) and Morro Chico (Chile), were isolated and then used to establish clonal cultures. To understand the phylogenetic relationships and species diversity of Antarctic Asterochloris species, molecular and morphological data were analyzed by using three microscopy techniques (light, confocal laser and transmission electron) and a multi-locus phylogeny with data from the nuclear-encoded internal transcribed spacer (ITS) rDNA and the actin and plastid-encoded ribulose bisphosphate carboxylase large chain (rbcL) coding genes. Morphological data of three Antarctic strains showed significant species-specific features in chloroplast while molecular data segregated the taxa into distinct three clades as well. Each species had unique molecular signatures that could be found in secondary structures of the ITS1 and ITS2. The species diversity of Antarctic Asterochloris was represented by six taxa, namely, A. glomerata, A. italiana, A. sejongensis, and three new species (A. antarctica, A. pseudoirregularis, A. stereocaulonicola).

Analyzing the Impact of Lockdown on COVID-19 Pandemic in Saudi Arabia

  • Gyani, Jayadev;Haq, Mohd Anul;Ahmed, Ahsan
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.39-46
    • /
    • 2022
  • The spread of Omicron, a mutated version of COVID-19 across several countries is leading to the discussion of lockdown once again for curbing the spread of the new virus. In this context, this research is showing the impact of lockdown for the successful control of the COVID-19 pandemic in Saudi Arabia. The outbreak of the COVID-19 pandemic around the globe has affected Saudi Arabia with around 2,37,803 confirmed cases within the initial 4 months of transmission. Saudi Arabia has announced a 21-day lockdown from March 23, 2020, to reduce the transmission of the COVID-19 pandemic. Machine Learning-based, Multinomial logistic regression was applied to understand the relationship between daily COVID-19 confirmed cases and lockdown in the 17 most-affected cities of KSA. We used secondary published data from the Ministry of Health, KSA daily dataset of COVID-19 confirmed case counts. These 17 cities were categorized into 4 classes based on lockdown dates. A total of three scenarios such as night lockdown, full lockdown, and no lockdown have been analyzed with the total number of confirmed cases with 4 classes. 15 out of 17 cities have shown a strong correlation with a confidence interval of 95%. These findings provide evidence that the COVID-19 pandemic may be partially suppressed with lockdown measures.

Calculation of Proton-Induced Reactions on Tellurium Isotopes Below 60 MeV for Medical Radioisotope Production

  • Kim, Doohwan;Jonghwa Chang;Yinlu Han
    • Nuclear Engineering and Technology
    • /
    • 제32권4호
    • /
    • pp.361-371
    • /
    • 2000
  • The 123Te(p,n)123I, 124Te(p,n)124I and 124Te(p,2n)123I reactions, among the many reaction channels opened, are the major reactions under consideration from a diagnostic purpose because reaction residuals as the gamma emitters are used for most radiophamaceutical applications involving radioiodine. Based on the available experimental data, the absorption cross sections and elastic scattering angular distributions of the proton-induced nuclear reaction on Te isotopes below 60 MeV are calculated using the optical model code APMNK. The transmission coefficients of neutron, proton, deuteron, trition and alpha particles are calculated by CUNF code and are fed into the GNASH code. By adjusting level density parameters and the pair correction values of some reaction channels, as well as the composite nucleus state density constants of the pre-equilibrium model, the production cross sections and energy-angle correlated spectra of the secondary light particles, as well as production cross sections and energy distributions of heavy recoils and gamma rays are calculated by the statistical plus pre-equilibrium model code GNASH. The calculated results are analysed and compared with the experimental data taken from the EXFOR. The optimized global optical model parameters give overall agreement with the experimental data over both the entire energy range and all tellurium isotopes.

  • PDF

Vicious Cycle of MAC Protocols of Cognitive Radio Ad Hoc Networks: Problem Statement

  • Htike, Zaw;Hong, Choong-Seon
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2012년도 한국컴퓨터종합학술대회논문집 Vol.39 No.1(D)
    • /
    • pp.294-296
    • /
    • 2012
  • In cognitive radio ad hoc networks, secondary users need to exchange control information before data transmission. This task is not trivial in cognitive radio networks due to the dynamic nature of environment. This problem is sometime called rendezvous problem of cognitive radio network. The rendezvous problem is normally tackled by using two famous approaches: the use of common control channel (CCC) and using channel hopping (a.k.a sequence-based protocols). However, these two famous solutions form a vicious cycle while solving the rendezvous problem. The main purpose of this paper is to point out how and why this vicious cycle is formed.

Opportunistic Reporting-based Sensing-Reporting-Throughput Optimization Scheme for Cooperative Cognitive Radio Networks

  • So, Jaewoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권3호
    • /
    • pp.1319-1335
    • /
    • 2017
  • This paper proposes an opportunistic reporting-based sensing-reporting-throughput optimization scheme that maximizes the spectral efficiency of secondary users (SUs) in cooperative cognitive radio networks with a soft combining rule. The performance of cooperative spectrum sensing depends on the sensing time, the reporting time of transmitting sensing results, and the fusion scheme. While longer sensing time and reporting time improve the sensing performance, this shortens the allowable data transmission time, which in turn degrades the spectral efficiency of SUs. The proposed scheme adopts an opportunistic reporting scheme to restrain the reporting overhead and it jointly controls the sensing-reporting overhead in order to increase the spectral efficiency of SUs. We show that there is a trade-off between the spectral efficiency of SUs and the overheads of cooperative spectrum sensing. The numerical results demonstrate that the proposed scheme significantly outperforms the conventional sensing-throughput optimization schemes when there are many SUs. Moreover, the numerical results show that the sensing-reporting time should be jointly optimized in order to maximize the spectral efficiency of SUs.

DFT를 이용한 송전선로 적응적 단상재폐로 방안에 관한 연구 (A Study on the Adaptive Single Pole Auto-Reclosure Techniques for Transmission Lines Based on Discrete Fourier Transform)

  • ;강승호;박장수
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2002년도 하계학술대회 논문집 A
    • /
    • pp.166-168
    • /
    • 2002
  • This paper presents a new numerical algorithm suitable for defining recloser reclaims time and blocking automatic reclosing during permanent faults on overhead lines. It is based on terminal voltage input data processing. The decision if it is safe or not to reclose is determined from the voltage signal of faulted and tripped line phase using Total Harmonic Distortion factor calculated by Discrete Fourier Transform. The algorithm was successfully tested using signals recorded on the real power system. The tests demonstrate the ability of presented algorithm to determine the secondary arc extinction time and to block unsuccessful automatic reclosing of HV lines with permanent fault.

  • PDF

인지 무선 시스템에서 전송 오류가 전송 용량에 미치는 영향에 대한 분석 (Analysis of Effects of Nonideal Channels on the Throughput of CR Systems)

  • 이상욱;임창헌
    • 한국통신학회논문지
    • /
    • 제34권9A호
    • /
    • pp.719-726
    • /
    • 2009
  • 인지 무선(cognitive radio) 시스템은 스펙트럼 감지(spectrum sensing) 과정을 통하여 주 사용자(primary user)의 출현 여부를 판단하는데, 스펙트럼 감지와 데이터 전송을 동시에 수행하기는 어렵기 때문에 통상적으로 스펙트럼 감지와 데이터 전송을 번갈아 가면서 실시한다. 이런 시스템 구조에서 협력 스펙트럼 감지(cooperative spectrum sensing)를 함께 사용할 때 부 사용자의 데이터 전송량을 최대로 할 수 있는 스펙트럼 감지 시간 및 그에 따른 최대 전송 용량에 대한 연구 결과가 이미 발표된 바 있다. 하지만 이 결과는 개별 부 사용자 단말과 융합 센터 사이에 이상적인 전송 채널을 전제로 한 것이어서 전송 오류에 따른 영향을 반영하고 있지 않다. 이에 본 논문에서는 부 사용자와 융합 센터간의 데이터 전송 환경을 이진 대칭 채널(binary symmetric channel)로 모델링한 후, 부 사용자가 확보할 수 있는 전송 용량과 이를 최대로 하는 스펙트럼 감지 시간을 분석하였다. 분석 결과 AND 융합 규칙을 사용하는 경우가 OR 융합 규칙을 사용하는 경우보다 전송 오류로 인한 전송 용량(throughput)의 손실이 작은 것으로 나타났다.

Performance Analysis of Opportunistic Spectrum Access Protocol for Multi-Channel Cognitive Radio Networks

  • Kim, Kyung Jae;Kwak, Kyung Sup;Choi, Bong Dae
    • Journal of Communications and Networks
    • /
    • 제15권1호
    • /
    • pp.77-86
    • /
    • 2013
  • Cognitive radio (CR) has emerged as one of effective methods to enhance the utilization of existing radio spectrum. Main principle of CR is that secondary users (SUs) are allowed to use the spectrum unused by primary users (PUs) without interfering PU's transmissions. In this paper, PUs operate on a slot-by-slot basis and SUs try to exploit the slots unused by PUs. We propose OSA protocols in the single channel and we propose an opportunistic spectrum access (OSA) protocols in the multi-channel cognitive radio networks with one control channel and several licensed channels where a slot is divided into contention phase and transmission phase. A slot is divided into reporting phase, contention phase and transmission phase. The reporting phase plays a role of finding idle channels unused by PUs and the contention phase plays a role of selecting a SU who will send packets in the data transmission phase. One SU is selected by carrier sense multiple access / collision avoidance (CSMA/CA) with request to send / clear to send (RTS/CTS) mechanism on control channel and the SU is allowed to occupy all remaining part of all idle channels during the current slot. For mathematical analysis, first we deal with the single-channel case and we model the proposed OSA media access control (MAC) protocol by three-dimensional discrete time Markov chain (DTMC) whose one-step transition probability matrix has a special structure so as to apply the censored Markov chain method to obtain the steady state distribution.We obtain the throughput and the distribution of access delay. Next we deal with the multi-channel case and obtain the throughput and the distribution of access delay by using results of single-channel case. In numerical results, our mathematical analysis is verified by simulations and we give numerical results on throughput and access delay of the proposed MAC protocol. Finally, we find the maximum allowable number of SUs satisfying the requirements on throughput and access delay.