16 results on '"Bang Chul Jung"'
Search Results
2. Stability Region of Hybrid Uplink NOMA: Game Theoretic Perspective
- Author
-
Jinho Choi, Bang Chul Jung, Jun-Bae Seo, and Hu Jin
- Subjects
Computer Science::Computer Science and Game Theory ,Computer Networks and Communications ,Network packet ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Stochastic game ,Aerospace Engineering ,Transmitter power output ,symbols.namesake ,Single antenna interference cancellation ,Nash equilibrium ,Automotive Engineering ,Telecommunications link ,Computer Science::Networking and Internet Architecture ,symbols ,Fading ,Electrical and Electronic Engineering ,business ,Random access ,Computer Science::Information Theory ,Computer network - Abstract
In this paper, we investigate stability region of hybrid uplink non-orthogonal multiple access (NOMA) in conjunction with non-cooperative game, where two users independently send packets with transmit power control according to fading channel gain to the same radio resource so that their packets are received at a base station (BS) with one of two target receive powers (TRPs). The BS then tries to decode the packets with successive interference cancellation (SIC) technique in power domain. We consider a symmetric non-cooperative game where the users (or players) send packets with one of two TRPs or no transmission. We examine the convexity of stability region at the mixed-strategy Nash equilibrium (NE) of the game, where no one's queue grows to infinity. Furthermore, we investigate how the stability region changes depending on the parameters of users’ payoff.
- Published
- 2021
- Full Text
- View/download PDF
3. Uplink NOMA Random Access Systems With Space–Time Line Code
- Author
-
Hu Jin, Jingon Joung, Bang Chul Jung, and Jun-Bae Seo
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Line code ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Aerospace Engineering ,020302 automobile design & engineering ,Throughput ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Transmitter power output ,Antenna diversity ,0203 mechanical engineering ,Single antenna interference cancellation ,Channel state information ,Automotive Engineering ,Telecommunications link ,Electrical and Electronic Engineering ,business ,Decoding methods ,Random access ,Computer Science::Information Theory ,Computer network - Abstract
This work proposes a random access system with uplink non-orthogonal multiple access (NOMA), where users transmit their packets by using the space-time line code (STLC) to fully exploit the spatial diversity without channel state information at the receiver. More specifically, users with a single antenna estimate channel gain from the base station (BS) with two antennas, encode the information using the STLC, and then transmit it using transmit power control so that the received power of their packets at the BS can be one of the predetermined values. The BS decodes the received packets via STLC decoding and the successive interference cancellation technique. Owing to spatial diversity, we show that the proposed scheme improves energy efficiency in comparison to the conventional system with a single antenna BS.
- Published
- 2020
- Full Text
- View/download PDF
4. Double Space–Time Line Codes
- Author
-
Bang Chul Jung, Jihoon Choi, and Jingon Joung
- Subjects
Block code ,Computer Networks and Communications ,Computer science ,Line code ,Transmitter ,Aerospace Engineering ,Antenna diversity ,Topology ,Multiplexing ,Spatial multiplexing ,Transmit diversity ,Channel state information ,Automotive Engineering ,Electrical and Electronic Engineering ,Decoding methods - Abstract
In this paper, an $M\times 4$ double space-time line code (D-STLC) is designed for a system with $M$ -transmit and four-receive antennas whose channel state information is available at the transmitter. By delivering two independent STLC data streams simultaneously, both spatial diversity and multiplexing gains are obtained, like a $4\times M$ double space-time transmit diversity (DSTTD) system that transmits two space-time block coded data streams. It is analytically shown that the decoding signal-to-interference-plus-noise ratios of D-STLC and DSTTD are identical to each other, and furthermore, it is numerically verified that the proposed D-STLC significantly outperforms a conventional $M\times 4$ STLC scheme and other existing spatial-diversity and spatial-multiplexing schemes, such as precoded space-time block code and precoded spatial multiplexing, in terms of achievable rate and bit-error-rate performance as the signal-to-noise ratio and/or transmission data rate increase.
- Published
- 2020
- Full Text
- View/download PDF
5. An Enhanced Random Access With Distributed Pilot Orthogonalization for Cellular IoT Networks
- Author
-
Bang Chul Jung, Taehoon Kim, and Dan Keun Sung
- Subjects
Computer Networks and Communications ,Orthogonal frequency-division multiplexing ,business.industry ,Computer science ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Aerospace Engineering ,Markov process ,020302 automobile design & engineering ,Throughput ,02 engineering and technology ,Collision ,symbols.namesake ,0203 mechanical engineering ,Automotive Engineering ,Telecommunications link ,Computer Science::Networking and Internet Architecture ,symbols ,Electrical and Electronic Engineering ,business ,Orthogonalization ,Random access ,Computer network - Abstract
In this paper, we propose an enhanced random access (RA) with a distributed pilot orthogonalization (ERA-DPO) for mitigating packet collisions in Step3 during the RA procedure in cellular internet-of-things (IoT) networks. Even though each IoT device experiences a preamble collision in Step1, it can avoid the packet collision in Step3 by differentiating uplink pilot with the proposed technique, which provides an opportunity for the collided packets to be separated in spatial domain by multiple receive antennas. We also mathematically analyze the performance of the proposed scheme in terms of packet collision probability, throughput, and resource efficiency, based on a Markov chain model. Simulation results reveal that the proposed scheme significantly reduces the packet collision probability and increases resource efficiency compared to the conventional scheme.
- Published
- 2020
- Full Text
- View/download PDF
6. BER Performance of Uplink NOMA With Joint Maximum-Likelihood Detector
- Author
-
Jeong Seon Yeom, Kab Seok Ko, Bang Chul Jung, and Han Seung Jang
- Subjects
Computer Networks and Communications ,Computer science ,Detector ,Aerospace Engineering ,medicine.disease ,Upper and lower bounds ,Erlang (unit) ,Noma ,Modulation ,Automotive Engineering ,Telecommunications link ,Computer Science::Networking and Internet Architecture ,medicine ,Fading ,Electrical and Electronic Engineering ,Algorithm ,Random variable ,Computer Science::Information Theory ,Communication channel ,Phase-shift keying - Abstract
We mathematically derive an upper bound of bit-error rate (BER) of uplink non-orthogonal multiple access (NOMA) systems with quadrature phase shift keying (QPSK) modulation in fading channels. In particular, we exploit the joint maximum-likelihood (ML) detector at a base station (BS) with multiple antennas since it results in the optimal BER performance of a super-imposed QPSK modulated symbols from multiple users. In particular, we obtain a closed-form integral of Q-function with Erlang distributed random variable to derive the BER. We also obtain diversity order of the uplink NOMA systems. Through extensive computer simulations, we validate that our analytical results match well with the simulation results especially in high signal-to-noise ratio (SNR) regime.
- Published
- 2019
- Full Text
- View/download PDF
7. Machine Learning Based Blind Decoding for Space–Time Line Code (STLC) Systems
- Author
-
Bang Chul Jung and Jingon Joung
- Subjects
Normalization (statistics) ,Computer Networks and Communications ,Computer science ,business.industry ,Line code ,Space time ,Aerospace Engineering ,020302 automobile design & engineering ,02 engineering and technology ,Machine learning ,computer.software_genre ,0203 mechanical engineering ,Automotive Engineering ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Cluster analysis ,computer ,Decoding methods ,Computer Science::Information Theory ,Communication channel - Abstract
In this correspondence paper, a novel machine learning (clustering) based blind decoding method is proposed for the space–time line code (STLC) systems without the information of modulation size and channels. The number of clusters, which is equivalent to the modulation size, is estimated from the received signals by using a $k$ -mean cluster validation metrics, such as silhouette score and Davies–Bouldin index, and the cluster indices are directly mapped to the transmitted binary information bits. To improve the clustering performance, received signal normalization and the initial centroids of the clusters are designed by exploiting the combined STLC signal structure. From the numerical results, it is verified that the proposed blind decoding method can achieve near-coherent decoding performance with either small-size modulation, low noise at the receiver, or a large number of transmit antennas.
- Published
- 2019
- Full Text
- View/download PDF
8. Performance Analysis of Reactive Symbol-Level Jamming Techniques
- Author
-
Bang Chul Jung and Han Seung Jang
- Subjects
021110 strategic, defence & security studies ,Computer Networks and Communications ,Computer science ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Transmitter ,0211 other engineering and technologies ,Aerospace Engineering ,020206 networking & telecommunications ,Jamming ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Transmission (telecommunications) ,Modulation ,Automotive Engineering ,0202 electrical engineering, electronic engineering, information engineering ,Bit error rate ,Electronic engineering ,Electrical and Electronic Engineering ,Communication channel ,Phase-shift keying - Abstract
The reactive symbol-level jamming (SLJ) technique is a simple but practical technique to disable or disrupt malicious communication links. After sensing the transmission and detecting the digital modulation scheme of the malicious transmitter, a communication node with the reactive SLJ technique, called a reactive jammer, generates random digital modulation symbols and then sends them to the malicious receiver. In this correspondence, we mathematically analyze both uncoded and coded bit error rate (BER) at the malicious receiver under not only reactive SLJ, but also Gaussian SLJ techniques. In particular, we consider the partial jamming scenario, in which a portion of symbols in a data frame are affected by the SLJ, which is a practical scenario under the reactive jamming techniques. We also consider the effect of imperfect power control and channel estimation error of the reactive jammer on the BER performance at the malicious receiver.
- Published
- 2018
- Full Text
- View/download PDF
9. Recursive Pseudo-Bayesian Access Class Barring for M2M Communications in LTE Systems
- Author
-
Hu Jin, Waqas Tariq Toor, Bang Chul Jung, and Jun-Bae Seo
- Subjects
Engineering ,Class (computer programming) ,Computer Networks and Communications ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Real-time computing ,Bayesian probability ,Aerospace Engineering ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Collision ,Preamble ,Idle ,Base station ,EnodeB ,0203 mechanical engineering ,Automotive Engineering ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,business ,Random access ,Computer network - Abstract
Commercial long-term evolution (LTE) systems adopt an access class barring (ACB) mechanism in the initial random access procedure with multiple preambles in order to accommodate bursty traffic arrivals of machine-type communications. In this paper, we propose two Bayesian ACB algorithms that estimate the number of active machine devices based only on the number of idle preambles in each slot. In the commercial LTE systems, eNodeB cannot instantaneously distinguish if a particular preamble is sent from a single device (i.e., success) or multiple devices (i.e., collision). However, the idle preambles can be instantaneously detected at the base station (BS) in each slot. Numerical results show that the proposed algorithms yield quite similar performance with the ideal ACB algorithm, assuming that the exact number of active devices is known to the eNodeB.
- Published
- 2017
- Full Text
- View/download PDF
10. On the Link Scheduling for Cellular-Aided Device-to-Device Networks
- Author
-
Tae-Won Ban and Bang Chul Jung
- Subjects
Computational complexity theory ,Computer Networks and Communications ,business.industry ,Computer science ,Frequency band ,Aerospace Engineering ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Frequency allocation ,Scheduling (computing) ,Base station ,Cellular communication ,0203 mechanical engineering ,Distributed algorithm ,Computer Science::Multimedia ,Automotive Engineering ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Resource management ,Electrical and Electronic Engineering ,business ,Computer network - Abstract
We consider a cellular-aided inband overlay device-to-device (D2D) network, where a base station (BS) and all devices share a frequency band for their communications, but the BS allocates dedicated radio resources to D2D direct communications to avoid the mutual interference between D2D and cellular communications. We first mathematically formulate the optimal sum rate of the D2D network, and provide closed-form approximations of the average sum rate for low and high signal-to-noise ratio (SNR) regimes. Furthermore, we propose two practical D2D link scheduling algorithms: centralized and distributed. The centralized algorithm reduces the computational complexity at the BS, and its performance is shown to be optimal since the SNR of D2D links tends to be either zero or infinity. The distributed algorithm significantly reduces the signaling overhead caused by channel state information feedback from devices to the BS, and the performance loss of the distributed algorithm is marginal compared with that of the centralized algorithm, particularly when the number of D2D pairs is small.
- Published
- 2016
- Full Text
- View/download PDF
11. On the Degrees of Freedom of the Large-Scale Interfering Two-Way Relay Network
- Author
-
Won-Yong Shin, Hyun Jong Yang, and Bang Chul Jung
- Subjects
FOS: Computer and information sciences ,Computer Networks and Communications ,Computer science ,Computer Science - Information Theory ,Degrees of freedom (statistics) ,Aerospace Engineering ,Scale (descriptive set theory) ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Topology ,Interference (wave propagation) ,Electromagnetic interference ,law.invention ,Computer Science - Networking and Internet Architecture ,symbols.namesake ,0203 mechanical engineering ,Relay ,law ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Computer Science::Information Theory ,Networking and Internet Architecture (cs.NI) ,Information Theory (cs.IT) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020302 automobile design & engineering ,020206 networking & telecommunications ,Additive white Gaussian noise ,Channel state information ,Automotive Engineering ,symbols - Abstract
Achievable degrees-of-freedom (DoF) of the large-scale interfering two-way relay network is investigated. The network consists of $K$ pairs of communication nodes (CNs) and $N$ relay nodes (RNs). It is assumed that $K\ll N$ and each pair of CNs communicates with each other through one of the $N$ relay nodes without a direct link between them. Interference among RNs is also considered. Assuming local channel state information (CSI) at each RN, a distributed and opportunistic RN selection technique is proposed for the following three promising relaying protocols: amplify--forward, decode--forward, and compute--forward. As a main result, the asymptotically achievable DoF is characterized as $N$ increases for the three relaying protocols. In particular, a sufficient condition on $N$ required to achieve the certain DoF of the network is analyzed. Through extensive simulations, it is shown that the proposed RN selection techniques outperform conventional schemes in terms of achievable rate even in practical communication scenarios. Note that the proposed technique operates with a distributed manner and requires only local CSI, leading to easy implementation for practical wireless systems., 18 pages, 5 figures, To appear in IEEE Transactions on Vehicular Technology
- Published
- 2016
- Full Text
- View/download PDF
12. On the Relaying Protocols Without Causing Capacity Loss at a Primary Node in Cognitive Radio Networks
- Author
-
Bang Chul Jung and Woohyuk Chang
- Subjects
Engineering ,Computer Networks and Communications ,Aerospace Engineering ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,law.invention ,Channel capacity ,Relay ,law ,Encoding (memory) ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,0601 history and archaeology ,Electrical and Electronic Engineering ,Computer Science::Information Theory ,060102 archaeology ,business.industry ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,06 humanities and the arts ,Cognitive radio ,Channel state information ,Automotive Engineering ,business ,Capacity loss ,Computer network ,Communication channel - Abstract
This paper raises the question of whether the secondary user can attain a nonzero achievable rate without causing capacity loss at the primary user, even when it is utilizing the channel in cognitive radio networks (CRNs). It is assumed that secondary nodes are aware of the channel state information (CSI) of primary nodes and of how the primary nodes operate, whereas the primary nodes operate with no prior knowledge about the secondary nodes. We first propose a full-duplex relaying protocol for the cognitive radio (CR) network with a single relay node shared by both the primary and the secondary networks. In this case, the shared relay is assumed to have full CSI of the primary nodes and to know how the primary and secondary nodes operate. The proposed relaying protocol enables the secondary network to achieve nonzero rates without causing capacity loss at the primary network in a certain channel condition. Then, we also propose three half-duplex relaying protocols for the CR network with two relays, each of which is dedicated to the primary or the secondary network, respectively. It is shown that appropriate combinations of the proposed three half-duplex relaying protocols make it always possible for the secondary network to achieve nonzero rates without causing capacity loss at the primary network. Achievable rates of the proposed full- and half-duplex relaying protocols are evaluated through extensive computer simulations. Simulation results show that the proposed relaying protocols provide nonzero achievable rates of the secondary network over a wide range of signal-to-noise ratios (SNRs).
- Published
- 2016
- Full Text
- View/download PDF
13. Effects of Heterogenous Mobility on Rate Adaptation and User Scheduling in Cellular Networks With HARQ
- Author
-
Su Min Kim, Dan Keun Sung, Wan Choi, and Bang Chul Jung
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Automatic repeat request ,Aerospace Engineering ,Hybrid automatic repeat request ,Throughput ,Round-robin scheduling ,Rate adaptation ,Fair-share scheduling ,Scheduling (computing) ,Automotive Engineering ,Cellular network ,Electrical and Electronic Engineering ,business ,Computer network ,Rayleigh fading - Abstract
In this paper, we investigate the effects of heterogeneous mobility on rate adaptation and user scheduling in cellular networks with hybrid automatic repeat request (HARQ). To this end, we first show the performance tradeoff between two extreme scheduling criteria: retransmission-oriented scheduling (ROS) and mixed scheduling (MS) criteria over time-correlated Rayleigh fading channels. Then, we propose an ROS-based joint rate adaptation and user scheduling (JRAUS) policy for cellular networks and compare it with the conventional and reference JRAUS policies. We also evaluate the system-level performance of the proposed ROS-based JRAUS policy in various user distribution and mobility scenarios. In particular, in an asymmetric user distribution and heterogeneous mobility scenario, which is the most general one in practice, the proposed JRUAS policy yields a throughput gain of 49% and a fairness gain of 155% over the conventional JRAUS policies. In this paper, we find that the rate adaptation is significant not only in a single point-to-point link but in multiuser systems with heterogeneous mobility as well.
- Published
- 2013
- Full Text
- View/download PDF
14. Performance Comparison of Downlink Capacity Improvement Schemes: Orthogonal Code-Hopping Multiplexing Versus Multiple Scrambling Codes
- Author
-
D. Keun Sung, Sung Soo Cho, and Bang Chul Jung
- Subjects
Engineering ,Computer Networks and Communications ,Orthogonal frequency-division multiplexing ,Code division multiple access ,business.industry ,Aerospace Engineering ,Jamming ,Multiplexing ,Scrambling ,Channel capacity ,Automotive Engineering ,Telecommunications link ,Electronic engineering ,Electrical and Electronic Engineering ,business ,Communication channel - Abstract
In this paper, we compare the performance of two downlink capacity-improvement schemes based on orthogonal code-hopping multiplexing (OCHM) and multiple scrambling codes (MSCs). Both OCHM and MSC systems have been proposed to overcome a code-limitation problem in a code division multiple access (CDMA) downlink. We mathematically analyze the user capacity in a general form, considering various factors such as user activity, spreading factor, amount of transmission symbol energy that is allocated to common control channels, amount of outer-cell interference, orthogonality factor, and sectorization factor. Numerical examples show that the capacity gain of the OCHM-based system increases as the other-cell interference decreases and the channel activity decreases. Thus, the OCHM-based system is a more effective scheme than the MSC-based system, considering that a code-limited situation more frequently occurs in the case of low other-cell interference and low channel activity. However, the OCHM-based system is more sensitive to the orthogonality factor.
- Published
- 2009
- Full Text
- View/download PDF
15. Performance Comparison of Downlink Capacity Improvement Schemes: Orthogonal Code-Hopping Multiplexing Versus Multiple Scrambling Codes.
- Author
-
Bang Chul Jung, Sung Soo Cho, and Dan Keun Sung
- Subjects
- *
SPREAD spectrum communications , *CODE division multiple access , *WIRELESS communications , *TIME division multiple access , *DATA transmission systems , *TELECOMMUNICATION - Abstract
In this paper, we compare the performance of two downlink capacity-improvement schemes based on orthogonal code-hopping multiplexing (OCHM) and multiple scrambling codes (MSCs). Both OCHM and MSC systems have been proposed to overcome a code-limitation problem in a code division multiple access (COMA) downlink. We mathematically analyze the user capacity in a general form, considering various factors such as user activity, spreading factor, amount of transmission symbol energy that is allocated to common control channels, amount of outer-cell interference, orthogonality factor, and sectorization factor. Numerical examples show that the capacity gain of the OCHM-based system increases as the other-cell interference decreases and the channel activity decreases. Thus, the OCHM-based system is a more effective scheme than the MSC-based system, considering that a code-limited situation more frequently occurs in the case of low other-cell interference and low channel activity. However, the OCHM-based system is more sensitive to the orthogonality factor. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
16. Performance Analysis of Orthogonal-Code Hopping Multiplexing Systems With Repetition, Convolutional, and Turbo Coding Schemes.
- Author
-
Bang Chul Jung and Dan Keun Sung
- Subjects
- *
ERROR rates , *ERROR analysis in mathematics , *MATHEMATICAL convolutions , *MULTIPLEXING , *POWER transmission , *COMPUTER simulation , *CODE division multiple access , *ELECTRONIC systems - Abstract
In orthogonal-code hopping multiplexing (OCHM) systems, hopping-pattern (HP) collisions may degrade system performance. Previous studies on the effect of HP collisions in OCHM systems were based on computer simulations, and there was no mathematical analysis of the bit-error-rate (BER) performance. The HP collisions in OCHM systems differ from hits in frequency-hopping systems or intracell interference in direct-sequence code-division multiple-access (DS/CDMA) systems because they can effectively be controlled through synergy and perforation techniques. In this paper, we introduce a received-signal model for OCHM systems called a perforation-only model and analyze the BER performance for OCHM systems in both uncoded and coded environments. Repetition, convolutional, and turbo codes are considered in coded environments. Through the analysis of BER performance, OCHM systems can more clearly be characterized, and the allocated power at the base station (BS) can be estimated for OCHM systems. Furthermore, the user capacity is analyzed for a given channel coding scheme. The results show that the uncoded BER is saturated by the perforation probability, and the coded BER is degraded as the perforation probability increases. We investigate the allocated power at the BS according to the perforation probability and compare the user capacities of OCHM systems using the three different types of coding schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.