ETRI Journal

Displaying 1-39 of 39 results

  • White Papers // Aug 2012

    System-Level Performance of Spread Spectrum-Based Add-On Service Overlaid Onto the Existing Terrestrial Digital Multimedia Broadcast Band

    The authors consider an overlaid broadcast service, where a Spread Spectrum (SS)-based broadcast signal is overlaid onto the existing Terrestrial Digital Multimedia Broadcasting (T-DMB) band. The system is similar to the augmented data transmission in the ATSC DTV, for which it was investigated mostly in terms of link level performance,...

    Provided By ETRI Journal

  • White Papers // Aug 2012

    MHP: Master-Handoff Protocol for Fast and Energy-Efficient Data Transfer Over SPI in Wireless Sensing Systems

    Serial Peripheral Interface (SPI) has been identified as a bottleneck in many wireless sensing systems today. SPI is used almost universally as the physical connection between the Micro-Controller Unit (MCU) and radios, storage devices, and many types of sensors. Virtually all wireless sensor nodes today perform up to twice as...

    Provided By ETRI Journal

  • White Papers // Aug 2012

    Applying Hebbian Theory to Enhance Search Performance in Unstructured Social-Like Peer-to-Peer Networks

    Unstructured Peer-To-Peer (p2p) networks usually employ flooding search algorithms to locate resources. However, these algorithms often require a large storage overhead or generate massive network traffic. To address this issue, previous researchers explored the possibility of building efficient p2p networks by clustering peers into communities based on their social relationships,...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Partial Shift Mapping for PAPR Reduction With Low Complexity in OFDM Systems

    The high peak-to-average power is one of the main drawbacks in OFDM systems. This paper proposes a Partial Shift Mapping (PSM) method for peak power reduction in OFDM systems. By utilizing the properties of the discrete Fourier transform, the proposed method generates a set of candidate signals without additional complex...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Exploiting Multichannel Diversity in Spectrum Sharing Systems Using Optimal Stopping Rule

    This paper studies the problem of exploiting multichannel diversity in a spectrum sharing system, where the Secondary User (SU) sequentially explores channel state information on the licensed channels with time consumption. To maximize the expected achievable throughput for the SU, the authors formulate this problem as an optimal stopping problem,...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Modified 802.11-Based Opportunistic Spectrum Access in Cognitive Radio Networks

    In this paper, a modified 802.11-based opportunistic spectrum access is proposed for single-channel cognitive radio networks where primary users operate on a slot-by-slot basis. In the authors' opportunistic spectrum access, control frames are used to reduce the slot-boundary impact and achieve channel reservation to improve throughput of secondary users. An...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Design and Optimization of Full Comparator Based on Quantum-Dot Cellular Automata

    Quantum-dot Cellular Automata (QCA) is one of the few alternative computing platforms that has the potential to be a promising technology because of higher speed, smaller size, and lower power consumption in comparison with CMOS technology. This paper proposes an optimized full comparator for implementation in QCA. The proposed design...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    A New Semantic Kernel Function for Online Anomaly Detection of Software

    In this paper, a new online anomaly detection approach for software systems is proposed. The novelty of the proposed approach is to apply a new semantic kernel function for a Support Vector Machine (SVM) classifier to detect fault-suspicious execution paths at run-time in a reasonable amount of time. The kernel...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Distributed Resource Allocation in Two-Hierarchy Networks

    In this paper, a new distributed resource allocation algorithm is proposed to alleviate the cross-tier interference for orthogonal frequency division multiplexing access macrocell and femtocell overlay. Specifically, the resource allocation problem is modeled as a non-cooperative game. Based on game theory, the authors propose an iterative algorithm between subchannel and...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    A Novel Data Transmission Scheme for ATSC Terrestrial DTV Systems

    In Advanced Television Systems Committee (ATSC) terrestrial Digital TeleVision (DTV) systems, additional very low-rate data can be transmitted by modulating the amplitude and polarity of the Transmitter IDentification (TxID) signal. Although the additional data transmission scheme offers reliable transmission and has a very large coverage area, it has a limitation...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Synchronization for IR-UWB System Using a Switching Phase Detector-Based Impulse Phase-Locked Loop

    Conventional synchronization algorithms for impulse radio require high-speed sampling and a precise local clock. Here, a Phase-Locked Loop (PLL) scheme is introduced to acquire and track periodical impulses. The proposed impulse PLL (iPLL) is analyzed under an ideal Gaussian noise channel and multipath environment. The timing synchronization can be recovered...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Impacts of Hierarchy in Ethernet Ring Networks on Service Resiliency

    In transport networks, a multi-ring architecture is very useful to facilitate network planning and to design and provide more resilient services for customers. Unlike traditional synchronous optical network multi-rings, the service resiliency of Ethernet-based multi-rings is significantly impacted by the ring hierarchy because a link or node failure in a...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Constructing Strong Identity-Based Designated Verifier Signatures With Self-Unverifiability

    An identity-based strong designated verifier signature scheme provides restricted verifiability only for a verifier designated by a signer and proper privacy for the signer. In this paper, the authors show that strong designated verifier signature schemes do not satisfy the self-unverifiability requirement in the sense that not only exposure of...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Acceptance-Diffusion Strategies for Tablet-PCs: Focused on Acceptance Factors of Non-Users and Satisfaction Factors of Users

    Among emerging devices propelling the growth of mobile devices, smartphones and tablet-PCs are among the most recognizable. In this paper, a research model is designed for exploring acceptance-diffusion strategies for tablet-PCs from the viewpoint of consumer perception, which is verified through a survey. The results of this paper show that...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Performance Analysis of a Two-Hop Fixed-Gain MIMO Multiuser Relay Network With End-to-End Antenna Selection

    This letter analyzes the performance of a two-hop MIMO multiuser relay network with a fixed gain amplify-and-forward protocol and antenna selection at the transmitter and receiver. A new expression for the cumulative distribution function of the highest instantaneous end-to-end signal-to-noise ratio is derived. Based on the above result, closed-form expressions...

    Provided By ETRI Journal

  • White Papers // Feb 2012

    Improved Wideband Precoding With Arbitrary Subcarrier Grouping in MIMO-OFDM Systems

    Precoding in the multiple-input multiple-output orthogonal frequency division multiplexing system is investigated. In conventional WideBand Precoding (WBP), only one precoder, obtained from the decomposition of the subcarrier independent channel matrix, is used for all subcarriers. With an investigation of the relationship between the subcarrier independent channel matrix and the temporal/frequency...

    Provided By ETRI Journal

  • White Papers // Feb 2012

    Secure Hardware Implementation of ARIA Based on Adaptive Random Masking Technique

    The block cipher ARIA has been threatened by side-channel analysis, and much research on countermeasures of this attack has also been produced. However, studies on countermeasures of ARIA are focused on software implementation, and there are no reports about hardware designs and their performance evaluation. Therefore, this paper presents an...

    Provided By ETRI Journal

  • White Papers // Feb 2012

    Tone Dual-Channel MAC Protocol With Directional Antennas for Mobile Ad Hoc Networks

    The directional Medium Access Control (MAC) protocol improves the throughput of mobile ad hoc networks but has a deafness problem and requires location information for neighboring nodes. In the dual-channel directional MAC protocol, the use of omnidirectional packets does not require the exact location of destination node. In this paper,...

    Provided By ETRI Journal

  • White Papers // Feb 2012

    Single Relay Selection for Bidirectional Cooperative Networks With Physical-Layer Network Coding

    To serve the growing demand of the bidirectional information exchange, the authors propose a single Relay Selection (RS) scheme for Physical-layer Network Coding (PNC) in a bidirectional cooperative network consisting of two sources and multiple relays. This RS scheme selects a single best relay by maximizing the bottleneck of the...

    Provided By ETRI Journal

  • White Papers // Feb 2012

    Block-Mode Lattice Reduction for Low-Complexity MIMO Detection

    The authors propose a very-low-complexity Lattice-Reduction (LR) algorithm for multi-input multi-output detection in time-varying channels. The proposed scheme reduces the complexity by performing LR in a block-wise manner. The proposed scheme takes advantage of the temporal correlation of the channel matrices in a block and its impact on the lattice...

    Provided By ETRI Journal

  • White Papers // Feb 2012

    Small-Size and High-Isolation MIMO Antenna for WLAN

    A small-sized (15 mm?30 mm) planar monopole MIMO antenna that offers high-isolation performance is presented in this letter. The antenna is miniaturized using inductive coupling within a meander-line radiator and capacitive coupling between a radiator and an isolator. High isolation is achieved by a T-shaped stub attached to the ground...

    Provided By ETRI Journal

  • White Papers // Feb 2012

    Hierarchical Identity-Based Encryption With Constant-Size Private Keys

    The main challenge at present in constructing Hierarchical Identity-Based Encryption (HIBE) is to solve the trade-off between private-key size and ciphertext size. At least one private-key size or ciphertext size in the existing schemes must rely on the hierarchy depth. In this paper, a new hierarchical computing technique is introduced...

    Provided By ETRI Journal

  • White Papers // Dec 2011

    Enhanced FCME Thresholding for Wavelet-Based Cognitive UWB Over Fading Channels

    The cognitive Ultra-WideBand (UWB) network detects interfering narrowband systems and adapts its configuration accordingly. An inherently adaptive and flexible candidate for cognitive UWB transmission is the Wavelet Packet Multi-Carrier Modulation (WPMCM). In this paper, the authors use an enhanced forward consecutive mean excision thresholding algorithm to tackle the noise uncertainty...

    Provided By ETRI Journal

  • White Papers // Dec 2011

    Codebook-Based Precoding for SDMA-OFDMA With Spectrum Sharing

    This paper focuses on codebook-based precoding for Space-Division Multiple Access/Orthogonal Frequency-Division Multiple Access (SDMA-OFDMA) systems aiming to guarantee high throughput for their users as well as to mitigate interference to Fixed Satellite Service (FSS). A systematic design of SDMA codebook for subband-based OFDMA is proposed, which forms multiple orthogonal beams...

    Provided By ETRI Journal

  • White Papers // Dec 2011

    New Elements Concentrated Planar Fractal Antenna Arrays for Celestial Surveillance and Wireless Communications

    This paper introduces three new fractal array configurations that have superior performance over the well-known Sierpinski fractal array. These arrays are based on the fractal shapes Dragon, Twig, and a new shape which will be called Flap fractal. Their superiority comes from the low side lobe level and/or the wide...

    Provided By ETRI Journal

  • White Papers // Dec 2011

    Energy-Efficient Adaptive Dynamic Sensor Scheduling for Target Monitoring in Wireless Sensor Networks

    Due to uncertainties in target motion and randomness of deployed sensor nodes, the problem of imbalance of energy consumption arises from sensor scheduling. This paper presents an energy-efficient adaptive sensor scheduling for a target monitoring algorithm in a local monitoring region of wireless sensor networks. Owing to excessive scheduling of...

    Provided By ETRI Journal

  • White Papers // Dec 2011

    Probabilistic Support Vector Machine Localization in Wireless Sensor Networks

    Sensor networks play an important role in making the dream of ubiquitous computing a reality. With a variety of applications, sensor networks have the potential to influence everyone's life in the near future. However, there are a number of issues in deployment and exploitation of these networks that must be...

    Provided By ETRI Journal

  • White Papers // Dec 2011

    Privacy-Preserving H.264 Video Encryption Scheme

    As a growing number of individuals are exposed to surveillance cameras, the need to prevent captured videos from being used inappropriately has increased. Privacy-related information can be protected through video encryption during transmission or storage, and several algorithms have been proposed for such purposes. However, the simple way of evaluating...

    Provided By ETRI Journal

  • White Papers // Nov 2011

    Nash Bargaining Solution for RFID Frequency Interference

    The authors present a fair and efficient solution for selfish readers with the Nash Bargaining Solution (NBS) to mitigate the effects of RFID frequency interference. They compare the NBS with a solution derived by the max log-sum scheme that maximizes total utility and show that for selfish and rational readers,...

    Provided By ETRI Journal

  • White Papers // Oct 2011

    Hybrid Distributed Stochastic Addressing Scheme for ZigBee/IEEE 802.15.4 Wireless Sensor Networks

    This paper proposes hybrid distributed stochastic addressing (HDSA), which combines the advantages of distributed addressing and stochastic addressing, to solve the problems encountered when constructing a network in a ZigBee-based wireless sensor network. HDSA can assign all the addresses for ZigBee beyond the limit of addresses assigned by the existing...

    Provided By ETRI Journal

  • White Papers // Oct 2011

    FEROM: Feature Extraction and Refinement for Opinion Mining

    Opinion mining involves the analysis of customer opinions using product reviews and provides meaningful information including the polarity of the opinions. In opinion mining, feature extraction is important since the customers do not normally express their product opinions holistically, but separately according to its individual features. However, previous research on...

    Provided By ETRI Journal

  • White Papers // Oct 2011

    GCC2Verilog Compiler Toolset for Complete Translation of C Programming Language Into Verilog HDL

    Reconfigurable computing using a Field-Programmable Gate-Array (FPGA) device has become a promising solution in system design because of its power efficiency and design flexibility. To bring the benefit of FPGA to many application programmers, there has been intensive research about automatic translation from High-Level programming Languages (HLL) such as C...

    Provided By ETRI Journal

  • White Papers // Oct 2011

    Cooperative Hybrid-ARQ Protocols: Unified Frameworks for Protocol Analysis

    Cooperative Hybrid-Automatic Repeat reQuest (HARQ) protocols, which can exploit the spatial and temporal diversities, have been widely studied. The efficiency of cooperative HARQ protocols is higher than that of cooperative protocols because retransmissions are only performed when necessary. The authors classify cooperative HARQ protocols as three Decode-and-Forward-based HARQ (DF-HARQ) protocols...

    Provided By ETRI Journal

  • White Papers // Oct 2011

    An Efficient Network Attack Visualization Using Security Quad and Cube

    Security Quad and Cube (SQC) is a network attack analyzer that is capable of aggregating many different events into a single significant incident and visualizing these events in order to identify suspicious or illegitimate behavior. A network administrator recognizes network anomalies by analyzing the traffic data and alert messages generated...

    Provided By ETRI Journal

  • White Papers // Oct 2011

    A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography

    Security in Wireless Sensor Networks (WSNs) is an upcoming research field which is quite different from traditional network security mechanisms. Many applications are dependent on the secure operation of a WSN, and have serious effects if the network is disrupted. Therefore, it is necessary to protect communication between sensor nodes....

    Provided By ETRI Journal

  • White Papers // Oct 2011

    Least Square Channel Estimation for Two-Way Relay MIMO OFDM Systems

    This paper considers the channel estimation for two-way relay MIMO OFDM systems. A Least Square (LS) channel estimation algorithm under block-based training is proposed. The Mean Square Error (MSE) of the LS channel estimate is computed, and the optimal training sequences with respect to this MSE are derived. Some numerical...

    Provided By ETRI Journal

  • White Papers // Oct 2011

    An Efficient Soft-Output MIMO Detection Method Based on a Multiple-Channel-Ordering Technique

    In this paper, the authors propose an efficient soft-output signal detection method for spatially multiplexed Multiple-Input Multiple-Output (MIMO) systems. The proposed method is based on the Ordered Successive Interference Cancellation (OSIC) algorithm, but it significantly improves the performance of the original OSIC algorithm by solving the error propagation problem. The...

    Provided By ETRI Journal

  • White Papers // Oct 2011

    Performance of Two-User Two-Way Amplify-and-Forward Relaying Systems With Scheduling

    In this paper, the authors study scheduling schemes for two-user two-way wireless relaying systems. Two transmission modes are considered: point-to-point direct transmission and two-way amplify-and-forward relaying. An optimal scheduling scheme that opportunistically selects the best transmission mode for each user is proposed to minimize the sum Bit Error Rate (BER)....

    Provided By ETRI Journal

  • White Papers // Apr 2008

    Forensic Data Acquisition From Cell Phones Using JTAG Interface

    With the role of cell phones in today's society as a digital personal assistant as well as the primary tool for personal communication, it is possible to imagine the involvement of cell phones in almost any type of crime. The progression of a criminal investigation can hinge on vital clues...

    Provided By ETRI Journal

  • White Papers // Oct 2011

    Hybrid Distributed Stochastic Addressing Scheme for ZigBee/IEEE 802.15.4 Wireless Sensor Networks

    This paper proposes hybrid distributed stochastic addressing (HDSA), which combines the advantages of distributed addressing and stochastic addressing, to solve the problems encountered when constructing a network in a ZigBee-based wireless sensor network. HDSA can assign all the addresses for ZigBee beyond the limit of addresses assigned by the existing...

    Provided By ETRI Journal

  • White Papers // Oct 2011

    FEROM: Feature Extraction and Refinement for Opinion Mining

    Opinion mining involves the analysis of customer opinions using product reviews and provides meaningful information including the polarity of the opinions. In opinion mining, feature extraction is important since the customers do not normally express their product opinions holistically, but separately according to its individual features. However, previous research on...

    Provided By ETRI Journal

  • White Papers // Oct 2011

    GCC2Verilog Compiler Toolset for Complete Translation of C Programming Language Into Verilog HDL

    Reconfigurable computing using a Field-Programmable Gate-Array (FPGA) device has become a promising solution in system design because of its power efficiency and design flexibility. To bring the benefit of FPGA to many application programmers, there has been intensive research about automatic translation from High-Level programming Languages (HLL) such as C...

    Provided By ETRI Journal

  • White Papers // Oct 2011

    Cooperative Hybrid-ARQ Protocols: Unified Frameworks for Protocol Analysis

    Cooperative Hybrid-Automatic Repeat reQuest (HARQ) protocols, which can exploit the spatial and temporal diversities, have been widely studied. The efficiency of cooperative HARQ protocols is higher than that of cooperative protocols because retransmissions are only performed when necessary. The authors classify cooperative HARQ protocols as three Decode-and-Forward-based HARQ (DF-HARQ) protocols...

    Provided By ETRI Journal

  • White Papers // Oct 2011

    An Efficient Network Attack Visualization Using Security Quad and Cube

    Security Quad and Cube (SQC) is a network attack analyzer that is capable of aggregating many different events into a single significant incident and visualizing these events in order to identify suspicious or illegitimate behavior. A network administrator recognizes network anomalies by analyzing the traffic data and alert messages generated...

    Provided By ETRI Journal

  • White Papers // Oct 2011

    A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography

    Security in Wireless Sensor Networks (WSNs) is an upcoming research field which is quite different from traditional network security mechanisms. Many applications are dependent on the secure operation of a WSN, and have serious effects if the network is disrupted. Therefore, it is necessary to protect communication between sensor nodes....

    Provided By ETRI Journal

  • White Papers // Oct 2011

    Least Square Channel Estimation for Two-Way Relay MIMO OFDM Systems

    This paper considers the channel estimation for two-way relay MIMO OFDM systems. A Least Square (LS) channel estimation algorithm under block-based training is proposed. The Mean Square Error (MSE) of the LS channel estimate is computed, and the optimal training sequences with respect to this MSE are derived. Some numerical...

    Provided By ETRI Journal

  • White Papers // Aug 2012

    System-Level Performance of Spread Spectrum-Based Add-On Service Overlaid Onto the Existing Terrestrial Digital Multimedia Broadcast Band

    The authors consider an overlaid broadcast service, where a Spread Spectrum (SS)-based broadcast signal is overlaid onto the existing Terrestrial Digital Multimedia Broadcasting (T-DMB) band. The system is similar to the augmented data transmission in the ATSC DTV, for which it was investigated mostly in terms of link level performance,...

    Provided By ETRI Journal

  • White Papers // Aug 2012

    MHP: Master-Handoff Protocol for Fast and Energy-Efficient Data Transfer Over SPI in Wireless Sensing Systems

    Serial Peripheral Interface (SPI) has been identified as a bottleneck in many wireless sensing systems today. SPI is used almost universally as the physical connection between the Micro-Controller Unit (MCU) and radios, storage devices, and many types of sensors. Virtually all wireless sensor nodes today perform up to twice as...

    Provided By ETRI Journal

  • White Papers // Aug 2012

    Applying Hebbian Theory to Enhance Search Performance in Unstructured Social-Like Peer-to-Peer Networks

    Unstructured Peer-To-Peer (p2p) networks usually employ flooding search algorithms to locate resources. However, these algorithms often require a large storage overhead or generate massive network traffic. To address this issue, previous researchers explored the possibility of building efficient p2p networks by clustering peers into communities based on their social relationships,...

    Provided By ETRI Journal

  • White Papers // Apr 2008

    Forensic Data Acquisition From Cell Phones Using JTAG Interface

    With the role of cell phones in today's society as a digital personal assistant as well as the primary tool for personal communication, it is possible to imagine the involvement of cell phones in almost any type of crime. The progression of a criminal investigation can hinge on vital clues...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Partial Shift Mapping for PAPR Reduction With Low Complexity in OFDM Systems

    The high peak-to-average power is one of the main drawbacks in OFDM systems. This paper proposes a Partial Shift Mapping (PSM) method for peak power reduction in OFDM systems. By utilizing the properties of the discrete Fourier transform, the proposed method generates a set of candidate signals without additional complex...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Exploiting Multichannel Diversity in Spectrum Sharing Systems Using Optimal Stopping Rule

    This paper studies the problem of exploiting multichannel diversity in a spectrum sharing system, where the Secondary User (SU) sequentially explores channel state information on the licensed channels with time consumption. To maximize the expected achievable throughput for the SU, the authors formulate this problem as an optimal stopping problem,...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Modified 802.11-Based Opportunistic Spectrum Access in Cognitive Radio Networks

    In this paper, a modified 802.11-based opportunistic spectrum access is proposed for single-channel cognitive radio networks where primary users operate on a slot-by-slot basis. In the authors' opportunistic spectrum access, control frames are used to reduce the slot-boundary impact and achieve channel reservation to improve throughput of secondary users. An...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Design and Optimization of Full Comparator Based on Quantum-Dot Cellular Automata

    Quantum-dot Cellular Automata (QCA) is one of the few alternative computing platforms that has the potential to be a promising technology because of higher speed, smaller size, and lower power consumption in comparison with CMOS technology. This paper proposes an optimized full comparator for implementation in QCA. The proposed design...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    A New Semantic Kernel Function for Online Anomaly Detection of Software

    In this paper, a new online anomaly detection approach for software systems is proposed. The novelty of the proposed approach is to apply a new semantic kernel function for a Support Vector Machine (SVM) classifier to detect fault-suspicious execution paths at run-time in a reasonable amount of time. The kernel...

    Provided By ETRI Journal

  • White Papers // Feb 2012

    Improved Wideband Precoding With Arbitrary Subcarrier Grouping in MIMO-OFDM Systems

    Precoding in the multiple-input multiple-output orthogonal frequency division multiplexing system is investigated. In conventional WideBand Precoding (WBP), only one precoder, obtained from the decomposition of the subcarrier independent channel matrix, is used for all subcarriers. With an investigation of the relationship between the subcarrier independent channel matrix and the temporal/frequency...

    Provided By ETRI Journal

  • White Papers // Feb 2012

    Secure Hardware Implementation of ARIA Based on Adaptive Random Masking Technique

    The block cipher ARIA has been threatened by side-channel analysis, and much research on countermeasures of this attack has also been produced. However, studies on countermeasures of ARIA are focused on software implementation, and there are no reports about hardware designs and their performance evaluation. Therefore, this paper presents an...

    Provided By ETRI Journal

  • White Papers // Feb 2012

    Tone Dual-Channel MAC Protocol With Directional Antennas for Mobile Ad Hoc Networks

    The directional Medium Access Control (MAC) protocol improves the throughput of mobile ad hoc networks but has a deafness problem and requires location information for neighboring nodes. In the dual-channel directional MAC protocol, the use of omnidirectional packets does not require the exact location of destination node. In this paper,...

    Provided By ETRI Journal

  • White Papers // Feb 2012

    Single Relay Selection for Bidirectional Cooperative Networks With Physical-Layer Network Coding

    To serve the growing demand of the bidirectional information exchange, the authors propose a single Relay Selection (RS) scheme for Physical-layer Network Coding (PNC) in a bidirectional cooperative network consisting of two sources and multiple relays. This RS scheme selects a single best relay by maximizing the bottleneck of the...

    Provided By ETRI Journal

  • White Papers // Dec 2011

    Enhanced FCME Thresholding for Wavelet-Based Cognitive UWB Over Fading Channels

    The cognitive Ultra-WideBand (UWB) network detects interfering narrowband systems and adapts its configuration accordingly. An inherently adaptive and flexible candidate for cognitive UWB transmission is the Wavelet Packet Multi-Carrier Modulation (WPMCM). In this paper, the authors use an enhanced forward consecutive mean excision thresholding algorithm to tackle the noise uncertainty...

    Provided By ETRI Journal

  • White Papers // Feb 2012

    Block-Mode Lattice Reduction for Low-Complexity MIMO Detection

    The authors propose a very-low-complexity Lattice-Reduction (LR) algorithm for multi-input multi-output detection in time-varying channels. The proposed scheme reduces the complexity by performing LR in a block-wise manner. The proposed scheme takes advantage of the temporal correlation of the channel matrices in a block and its impact on the lattice...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Distributed Resource Allocation in Two-Hierarchy Networks

    In this paper, a new distributed resource allocation algorithm is proposed to alleviate the cross-tier interference for orthogonal frequency division multiplexing access macrocell and femtocell overlay. Specifically, the resource allocation problem is modeled as a non-cooperative game. Based on game theory, the authors propose an iterative algorithm between subchannel and...

    Provided By ETRI Journal

  • White Papers // Feb 2012

    Small-Size and High-Isolation MIMO Antenna for WLAN

    A small-sized (15 mm?30 mm) planar monopole MIMO antenna that offers high-isolation performance is presented in this letter. The antenna is miniaturized using inductive coupling within a meander-line radiator and capacitive coupling between a radiator and an isolator. High isolation is achieved by a T-shaped stub attached to the ground...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    A Novel Data Transmission Scheme for ATSC Terrestrial DTV Systems

    In Advanced Television Systems Committee (ATSC) terrestrial Digital TeleVision (DTV) systems, additional very low-rate data can be transmitted by modulating the amplitude and polarity of the Transmitter IDentification (TxID) signal. Although the additional data transmission scheme offers reliable transmission and has a very large coverage area, it has a limitation...

    Provided By ETRI Journal

  • White Papers // Feb 2012

    Hierarchical Identity-Based Encryption With Constant-Size Private Keys

    The main challenge at present in constructing Hierarchical Identity-Based Encryption (HIBE) is to solve the trade-off between private-key size and ciphertext size. At least one private-key size or ciphertext size in the existing schemes must rely on the hierarchy depth. In this paper, a new hierarchical computing technique is introduced...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Synchronization for IR-UWB System Using a Switching Phase Detector-Based Impulse Phase-Locked Loop

    Conventional synchronization algorithms for impulse radio require high-speed sampling and a precise local clock. Here, a Phase-Locked Loop (PLL) scheme is introduced to acquire and track periodical impulses. The proposed impulse PLL (iPLL) is analyzed under an ideal Gaussian noise channel and multipath environment. The timing synchronization can be recovered...

    Provided By ETRI Journal

  • White Papers // Dec 2011

    Codebook-Based Precoding for SDMA-OFDMA With Spectrum Sharing

    This paper focuses on codebook-based precoding for Space-Division Multiple Access/Orthogonal Frequency-Division Multiple Access (SDMA-OFDMA) systems aiming to guarantee high throughput for their users as well as to mitigate interference to Fixed Satellite Service (FSS). A systematic design of SDMA codebook for subband-based OFDMA is proposed, which forms multiple orthogonal beams...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Impacts of Hierarchy in Ethernet Ring Networks on Service Resiliency

    In transport networks, a multi-ring architecture is very useful to facilitate network planning and to design and provide more resilient services for customers. Unlike traditional synchronous optical network multi-rings, the service resiliency of Ethernet-based multi-rings is significantly impacted by the ring hierarchy because a link or node failure in a...

    Provided By ETRI Journal

  • White Papers // Dec 2011

    New Elements Concentrated Planar Fractal Antenna Arrays for Celestial Surveillance and Wireless Communications

    This paper introduces three new fractal array configurations that have superior performance over the well-known Sierpinski fractal array. These arrays are based on the fractal shapes Dragon, Twig, and a new shape which will be called Flap fractal. Their superiority comes from the low side lobe level and/or the wide...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Constructing Strong Identity-Based Designated Verifier Signatures With Self-Unverifiability

    An identity-based strong designated verifier signature scheme provides restricted verifiability only for a verifier designated by a signer and proper privacy for the signer. In this paper, the authors show that strong designated verifier signature schemes do not satisfy the self-unverifiability requirement in the sense that not only exposure of...

    Provided By ETRI Journal

  • White Papers // Dec 2011

    Energy-Efficient Adaptive Dynamic Sensor Scheduling for Target Monitoring in Wireless Sensor Networks

    Due to uncertainties in target motion and randomness of deployed sensor nodes, the problem of imbalance of energy consumption arises from sensor scheduling. This paper presents an energy-efficient adaptive sensor scheduling for a target monitoring algorithm in a local monitoring region of wireless sensor networks. Owing to excessive scheduling of...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Acceptance-Diffusion Strategies for Tablet-PCs: Focused on Acceptance Factors of Non-Users and Satisfaction Factors of Users

    Among emerging devices propelling the growth of mobile devices, smartphones and tablet-PCs are among the most recognizable. In this paper, a research model is designed for exploring acceptance-diffusion strategies for tablet-PCs from the viewpoint of consumer perception, which is verified through a survey. The results of this paper show that...

    Provided By ETRI Journal

  • White Papers // Dec 2011

    Probabilistic Support Vector Machine Localization in Wireless Sensor Networks

    Sensor networks play an important role in making the dream of ubiquitous computing a reality. With a variety of applications, sensor networks have the potential to influence everyone's life in the near future. However, there are a number of issues in deployment and exploitation of these networks that must be...

    Provided By ETRI Journal

  • White Papers // Apr 2012

    Performance Analysis of a Two-Hop Fixed-Gain MIMO Multiuser Relay Network With End-to-End Antenna Selection

    This letter analyzes the performance of a two-hop MIMO multiuser relay network with a fixed gain amplify-and-forward protocol and antenna selection at the transmitter and receiver. A new expression for the cumulative distribution function of the highest instantaneous end-to-end signal-to-noise ratio is derived. Based on the above result, closed-form expressions...

    Provided By ETRI Journal

  • White Papers // Dec 2011

    Privacy-Preserving H.264 Video Encryption Scheme

    As a growing number of individuals are exposed to surveillance cameras, the need to prevent captured videos from being used inappropriately has increased. Privacy-related information can be protected through video encryption during transmission or storage, and several algorithms have been proposed for such purposes. However, the simple way of evaluating...

    Provided By ETRI Journal

  • White Papers // Oct 2011

    An Efficient Soft-Output MIMO Detection Method Based on a Multiple-Channel-Ordering Technique

    In this paper, the authors propose an efficient soft-output signal detection method for spatially multiplexed Multiple-Input Multiple-Output (MIMO) systems. The proposed method is based on the Ordered Successive Interference Cancellation (OSIC) algorithm, but it significantly improves the performance of the original OSIC algorithm by solving the error propagation problem. The...

    Provided By ETRI Journal

  • White Papers // Nov 2011

    Nash Bargaining Solution for RFID Frequency Interference

    The authors present a fair and efficient solution for selfish readers with the Nash Bargaining Solution (NBS) to mitigate the effects of RFID frequency interference. They compare the NBS with a solution derived by the max log-sum scheme that maximizes total utility and show that for selfish and rational readers,...

    Provided By ETRI Journal

  • White Papers // Oct 2011

    Performance of Two-User Two-Way Amplify-and-Forward Relaying Systems With Scheduling

    In this paper, the authors study scheduling schemes for two-user two-way wireless relaying systems. Two transmission modes are considered: point-to-point direct transmission and two-way amplify-and-forward relaying. An optimal scheduling scheme that opportunistically selects the best transmission mode for each user is proposed to minimize the sum Bit Error Rate (BER)....

    Provided By ETRI Journal