The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, the system-level performance of nonorthogonal multiple access (NOMA) in coordinated direct and relay transmission (CDRT) is investigated. Considering a successive interference cancellation (SIC) receiver under the 3D channel model for LTE, the system-level performance of the NOMA-CDRT is compared to the NOMA in non-coordinated direct and relay transmission (nCDRT). Simulation results...
Sparse code multiple access (SCMA) is a nonorthogonal multiple access scheme based on a multi-dimensional codebook with sparse codewords. The sparsity property of SCMA allows the receiver to take advantage of low-complexity message passing algorithm (MPA) detector with maximum likelihood (ML)-like performance. The use of multiple antennas at the SCMA receiver will improve the detection performance...
This paper analyzes energy cost reduction from peak demand shaving when a CES provider adopts ESS for the CHP-based CES microgrid site in Seoul, Korea. The simulation results show that about 9% of peak shaving can be realized when a 270kWh ESS is used for three thousand CES households. When two or three ESSs are adopted, peak demand shaving increases at most into 12% or 14%, which concludes that ESS...
The world is facing the pandemic of infectious diseases. Together with the development of transportation technology, the global spread of diseases continues to accelerate. To examine the correlation between transportation and infection, we did the statistical analysis on the highway transport and the domestic flight based on the GIS in the South Korea. Consequentially, the traffic movement through...
This paper investigates the deployment of an SDN-based UAV network providing communication service. Such a network is extremely useful in emergency scenarios. In such a network, the mobility of UAVs is minimal. We consider the placement of the SDN controller and its implications in terms of communication overhead and end-to-end delay of the control packets exchanged between the UAVs and the controller...
Energy management system (EMS) using renewable energy such as sunlight is expected to build a low-carbon society. In this paper, we report the modeling of EMS components using SPICE (simulation program with integrated circuit emphasis) and the estimation of the energy self-sufficiency rate by EMS simulation. We develop the simulation models of photovoltaic (PV) power generation system, storage battery...
Human behaviors may change over time, but people always tend to preserve their preference. People typically like similar types of contents, for example, movies that they watch in regular intervals with the same amount of interests. On the other hand, the Internet is moving towards a content-oriented structure from the host-oriented structure. Content-Centric Networking (CCN), a content-oriented paradigm,...
The Internet was designed to support host-oriented services. However, users are typically interested in the content itself rather than the location of the content. As the usage of the Internet for content retrieval is increasing rapidly, some intelligent methods have to be employed in the base stations to provide faster and seamless content delivery. In this paper, we propose a CCN-based fast content...
Existing data management and searching system for Internet of Things uses centralized database. For this reason, security vulnerabilities are found in this system which consists of server such as IP spoofing, single point of failure and Sybil attack. This paper proposes data management system is based on blockchain which ensures security by using ECDSA digital signature and SHA-256 hash function....
Considering an incomplete signals acquisition due to a sparse beacon deployment, this paper proposes a generalized similarity filter to improve the performance of proximity detection and thus guarantee the quality of proximity-based service (PBS). In particular, this paper leverages Bluetooth Low Energy (BLE) Beacons to realize a PBS system which comprises a number of Proximities of Interest (PoIs)...
In this paper, based on the application of the sum-product (SP) algorithm to factor graphs (FGs), we investigate two optimal equalization algorithms, i.e., unconstrained linear equalization and constrained linear equalization for intersymbol interference (ISI) channels, both of which use the criterion of LMMSE. From simulations we know, the MSE performance of these two algorithms is much better than...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.