• Title/Summary/Keyword: tradeoff analysis

Search Result 107, Processing Time 0.027 seconds

Low Complexity Zero-Forcing Beamforming for Distributed Massive MIMO Systems in Large Public Venues

  • Li, Haoming;Leung, Victor C.M.
    • Journal of Communications and Networks
    • /
    • v.15 no.4
    • /
    • pp.370-382
    • /
    • 2013
  • Distributed massive MIMO systems, which have high bandwidth efficiency and can accommodate a tremendous amount of traffic using algorithms such as zero-forcing beam forming (ZFBF), may be deployed in large public venues with the antennas mounted under-floor. In this case the channel gain matrix H can be modeled as a multi-banded matrix, in which off-diagonal entries decay both exponentially due to heavy human penetration loss and polynomially due to free space propagation loss. To enable practical implementation of such systems, we present a multi-banded matrix inversion algorithm that substantially reduces the complexity of ZFBF by keeping the most significant entries in H and the precoding matrix W. We introduce a parameter p to control the sparsity of H and W and thus achieve the tradeoff between the computational complexity and the system throughput. The proposed algorithm includes dense and sparse precoding versions, providing quadratic and linear complexity, respectively, relative to the number of antennas. We present analysis and numerical evaluations to show that the signal-to-interference ratio (SIR) increases linearly with p in dense precoding. In sparse precoding, we demonstrate the necessity of using directional antennas by both analysis and simulations. When the directional antenna gain increases, the resulting SIR increment in sparse precoding increases linearly with p, while the SIR of dense precoding is much less sensitive to changes in p.

Gate Management System by Face Recognition using Smart Phone (스마트폰을 이용한 얼굴인식 출입관리 시스템)

  • Kwon, Ki-Hyeon;Lee, Hyung-Bong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.9-15
    • /
    • 2011
  • In this paper, we design and implement of gate management system by face recognition using smart phone. We investigate various algorithms for face recognition on smart phones. First step in any face recognition system is face detection. We investigated algorithms like color segmentation, template matching etc. for face detection, and Eigen & Fisher face for face recognition. The algorithms have been first profiled in MATLAB and then implemented on the Android phone. While implementing the algorithms, we made a tradeoff between accuracy and computational complexity of the algorithm mainly because we are implementing the face recognition system on a smart phone with limited hardware capabilities.

Power Allocation for Opportunistic Full-Duplex based Relay Selection in Cooperative Systems

  • Zhong, Bin;Zhang, Dandan;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.3908-3920
    • /
    • 2015
  • In this paper, performance analysis of full-duplex (FD) relay selection under decode-and-forward (DF) relaying mode is carried out by taking into account several critical factors, including the distributions of the received signal-to-noise ratio (SNR) and the outage probability of wireless links. The tradeoff between the FD and half-duplex (HD) modes for relay selection techniques is also analyzed, where the former suffers from the impact of residual self-interference, but the latter requires more channel resources than the former (i.e., two orthogonal channels are required). Furthermore, the impact of optimal power allocation (OPA) on the proposed relay-selection scheme is analyzed. Particularly, the exact closed-form expressions for outage probability of the proposed scheme over Rayleigh fading channels are derived, followed by validating the proposed analysis using simulation. Numerical results show that the proposed FD based scheme outperforms the HD based scheme by more than 4 dB in terms of coding gain, provided that the residual self-interference level in the FD mode can be substantially suppressed to the level that is below the noise power.

Performance Analysis Based on RAU Selection and Cooperation in Distributed Antenna Systems

  • Wang, Gang;Meng, Chao;Heng, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5898-5916
    • /
    • 2018
  • In this paper, the downlink performance of multi-cell distributed antenna systems (DAS) with a single user in each cell is investigated. Assuming the channel state information is available at the transmitter, four transmission modes are formulated as combinations of remote antenna units (RAUs) selection and cooperative transmission, namely, non-cooperative transmission without RAU selection (NCT), cooperative transmission without RAU selection (CT), non-cooperative transmission with RAU selection (NCT_RAUS), and cooperative transmission with RAU selection (CT_RAUS). By using probability theory, the cumulative distribution function (CDF) of a user's signal to interference plus noise ratio (SINR) and the system ergodic capacity under the above four modes are determined, and their closed-form expressions are obtained. Furthermore, the system energy efficiency (EE) is studied by introducing a realistic power consumption model of DAS. An expression for determining EE is formulated, and the closed-form tradeoff relationship between spectral efficiency (SE) and EE is derived as well. Simulation results demonstrate their consistency with the theoretical analysis and reveal the factors constraining system EE, which provide a scientific basis for future design and optimization of DAS.

Performance Analysis of 6DoF Video Streaming Based on MPEG Immersive Video (MPEG 몰입형 비디오 기반 6DoF 영상 스트리밍 성능 분석)

  • Jeong, Jong-Beom;Lee, Soonbin;Kim, Inae;Ryu, Eun-Seok
    • Journal of Broadcast Engineering
    • /
    • v.27 no.5
    • /
    • pp.773-793
    • /
    • 2022
  • The moving picture experts group (MPEG) immersive video (MIV) coding standard has been established to support six degrees of freedom (6DoF) in virtual reality (VR) by transmitting high-quality multiple immersive videos. The MIV exploits two approaches considering tradeoff between bandwidth and computational complexity: 1) eliminating correlation between multi-view videos or 2) selecting representative videos. This paper presents performance analysis on intermediate synthesized views on source view positions and synthesized pose traces using high-efficiency video coding (HEVC) and versatile video coding (VVC) for above-mentioned two approaches.

Analysis and Comparison for a 4-Coil Magnetic Resonance Wireless Power Transfer System (4-코일 자기 공진 무선 전력 전송 시스템의 해석법 연구)

  • Lee, Gunbok;Park, Wee Sang
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.2
    • /
    • pp.168-179
    • /
    • 2013
  • The critical point analysis(CA) and impedance matching analysis(IA) are performed and compared for a 4-coil magnetic resonance wireless power transfer system. Because the operating frequency splits at short distance while the efficiency drops drastically at long distance in this system, the optimization technique is needed for either a specific distance or efficiency at the fixed frequency. CA uses the critical point where shows maximum efficiency in the entire range and IA uses the impedance matching technique to achieve maximum efficiency at the specific distance. Comparison result shows that IA is more efficient than CA. Also, it shows one side matching has a tradeoff relationship comparing to both side matching. By using four spiral resonant coils, the analysis was experimentally verified. The measured data agreed well with the calculated data.

Comparison between static tradeoff theory and pecking order theory (정태적 절충이론과 자본조달순위이론의 비교)

  • Park, Jung-Ju
    • Management & Information Systems Review
    • /
    • v.31 no.1
    • /
    • pp.89-116
    • /
    • 2012
  • This paper is an empirical study for the listed manufacturing companies in the Korea Stock Exchange during the sample period(2001-2010). The research is based on the target adjustment model(Shyam-Sunder and Myers(1999)) and the pecking order model(Frank and Goyal(2003)), and is aimed at reflecting the critical viewpoint of Chirinko and Singha(2000). An analysis in the model of Shyam-Sunder and Myers(1999) shows the value is too low to support the pecking order model in view of the following results. A target adjustment coefficient value is between 0 and 1, and is significant variable and explanatory power is very high, while deficit-in-funds coefficients close to 0. In addition, the result of an empirical test following the methodology used by Frank and Goyal(2003) does not support the pecking order theory.

  • PDF

Security-reliability Analysis for a Cognitive Multi-hop Protocol in Cluster Networks with Hardware Imperfections

  • Tin, Phu Tran;Nam, Pham Minh;Duy, Tran Trung;Voznak, Miroslav
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.3
    • /
    • pp.200-209
    • /
    • 2017
  • In this paper, we investigate the tradeoff between security and reliability for a multi-hop protocol in cluster-based underlay cognitive radio networks. In the proposed protocol, a secondary source communicates with a secondary destination via the multi-hop relay method in the presence of a secondary eavesdropper. To enhance system performance under the joint impact of interference constraint required by multiple primary users and hardware impairments, the best relay node is selected at each hop to relay the source data to the destination. Moreover, the destination is equipped with multiple antennas and employs a selection combining (SC) technique to combine the received data. We derive closed-form expressions of the intercept probability (IP) for the eavesdropping links and the outage probability (OP) for the data links over a Rayleigh fading channel. Finally, the correction of our derivations is verified by Monte-Carlo simulations.

Balancing Efficiency and Flexibility in Software Project: The Role of Team Collective Improvisation, behavioral integration, and member diversity

  • Lee, Young-Joo;Lee, Jung-Hoon;Ham, Kyung Sun
    • Journal of Contemporary Eastern Asia
    • /
    • v.16 no.1
    • /
    • pp.22-45
    • /
    • 2017
  • The successful management of software (SW) projects is a continuous concern to managers, which is attributed to the contradictory demands that most projects are facing; meeting user requirements within time and budget limit while flexibly dealing risks during the progress of the projects. The present study asserts project performance and risk mitigation are not tradeoff but to be achieved simultaneously, which is called SW project ambidexterity. Drawing on the literature on organizational behavior, hypotheses are developed speculating the relation among project performance, risk mitigation, team collective improvisation, team behavioral integration, and team diversity. Using empirical data collected from 102 SW project teams of 507 team members in South Korea, empirical analysis indicates team collective improvisation is a significant antecedent to SW project ambidexterity, playing a pivotal role to balance the contradictory demands. Furthermore, team behavioral integration positively influences the degree of team collective improvisation, and the magnitude of the relation is partially contingent on the team members' age and major diversity. The present study advances theory by providing a context specific explanation about the SW project ambidexterity and its precedents.

New Authentication Methods based on User's Behavior Big Data Analysis on Cloud (클라우드 환경에서 빅데이터 분석을 통한 새로운 사용자 인증방법에 관한 연구)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.31-36
    • /
    • 2016
  • User authentication is the first step to network security. There are lots of authentication types, and more than one authentication method works together for user's authentication in the network. Except for biometric authentication, most authentication methods can be copied, or someone else can adopt and abuse someone else's credential method. Thus, more than one authentication method must be used for user authentication. However, more credential makes system degrade and inefficient as they log on the system. Therefore, without tradeoff performance with efficiency, this research proposed user's behavior based authentication for secure communication, and it will improve to establish a secure and efficient communication.