75,580 research outputs found

    인프라가 없는 환경에서의 재난 통신망을 위한 동기화 및 그룹 형성 기법

    Get PDF
    학위논문 (박사)-- 서울대학교 대학원 : 전기·컴퓨터공학부, 2016. 8. 이광복.A public safety network (PSN) has been developed as a special class of wireless communication network that aims to save lives and prevent property damage. PSNs have evolved separately from commercial wireless networks satisfying various requirements and regulatory issues associated with them. With growing needs for the transmission of multimedia data, existing voice-centric PSN technologies are facing hurdles in fulllfilling the demand for high capacity and different types of services. Mission-critical requirements for PSNs include the guaranteed dissemination of emergency information such as alarm texts, images, and videos of disasters even in the absence (or destruction) of cellular infrastructure. Many research projects have been launched to meet the mission-critical requirement of PSN, e.g., Aerial Base Station with Opportunistic Links for Unexpected & TEmporary events (ABSOLUTE), Alert for All (Alert4All), Mobile Alert InformAtion system using satellites (MAIA), and so on. The research projects include the emergency communications using satellite communications, aerial eNodeBs, and terrestrial radio access technologies. The approaches take advantages of inherent broadcasting and resilience with respect to Earth damages for disseminations of alert messages. In this dissertation, we limit our interests to terrestrial radio access technologies, e.g., LTE, TETRA, TETRAPOL, and DMR, because PSNs should be operational even in the low-class user equipments (UEs) that are lack of satellite communication functionalities. In Chapter 2 of this dissertation, we propose a distributed synchronization algorithm for infrastructure-less public safety networks. The proposed algorithm aims to minimize the number of out-of-sync user equipments by efficiently forming synchronization groups and selecting synchronization reference UEs in a distributed manner. For the purpose, we introduce a novel affinity propagation technique which enables an autonomous decision at each UE based on local message-passing among neighboring UEs. Our simulation results show that the proposed algorithm reduces the number of out-of-sync UEs by up to 40% compared to the conventional scan-and-select strategy. In Chapter 3 of this dissertation, we study an infrastructure-less public safety network where energy efficiency and reliability are critical requirements in the absence of cellular infrastructure, i.e., base stations and wired backbone lines. We formulate the IPSN group formation as a clustering problem. A subset of user equipments, called group owners (GOs), are chosen to serve as virtual base stations, and each non-GO UE, referred to as group member, is associated with a GO as its member. We propose a novel clustering algorithm in the framework of affinity propagation, which is a state- of-the-art message-passing technique with a graphical model approach developed in the machine learning field. Unlike conventional clustering approaches, the proposed clustering algorithm minimizes the total energy consumption while guaranteeing link reliability by adjusting the number of GOs. Simulation results verify that the IPSN optimized by the proposed clustering algorithm reduces the total energy consumption of the network by up to 31% compared to the conventional clustering approaches.Chapter 1 INTRODUCTION 1 1.1 Distributed Synchronization Algorithm for Infrastructure-less Public Safety Networks 2 1.2 Reliable Low-Energy Group Formation for Infrastructure-less Public Safety Networks 3 1.3 Outline of Dissertation 8 1.4 Notations 8 Chapter 2 Distributed Synchronization Algorithm for Infrastructure-less Public Safety Networks 10 2.1 System Model and Problem Formulation 10 2.2 Distributed Synchronization Algorithm based on Message-passing 17 2.2.1 Preliminaries: affinity propagation 17 2.2.2 Distributed Synchronization Algorithm 19 2.3 Distributed Synchronization Procedures 20 2.4 Simulation Results 25 Chapter 3 Reliable Low-Energy Group Formation for Infrastructure-less Public Safety Networks 42 3.1 System Model and Problem Formulation 42 3.1.1 Channel Model and Network Structure 42 3.1.2 ProblemFormulation 44 3.2 Constrained Clustering Algorithm for IPSN 47 3.2.1 Similarity Modeling 47 3.2.2 Proposed Clustering Algorithm 47 3.3 Determination of initial point 51 3.4 Simulation Results 56 Chapter 4 Conclusion and Future Work 72 4.1 Conclusion 72 4.2 Future Work 73 Bibliography 74 Abstract (In Korean) 82Docto

    Understanding the formative stage of Technological Innovation System development. The case of natural gas as an automotive fuel

    Get PDF
    This study contributes to insights into mechanisms that influence the successes and failures of emerging energy technologies. It is assumed that for an emerging technology to fruitfully develop, it should be fostered by a Technological Innovation System (TIS), which is the network of actors, institutions and technologies in which it is embedded. For an emerging technology a TIS has yet to be built up. The research focuses on the dynamics of this build-up process by mapping the development of seven key activities: so-called system functions. The main contribution revolves around the notion of cumulative causation, or the phenomenon that the build-up of a TIS may accelerate due to system functions reinforcing each other over time. As an empirical basis, an analysis is provided of the historical development of the TIS around automotive natural gas technology in the Netherlands (1970-2007). The results show that this TIS undergoes a gradual build-up in the 1970s, followed by a breakdown in the 1980s and, again, a build-up from 2000-2007. It is shown that, underlying these trends, there are different forms of cumulative causation, here called motors of innovation. The study provides strategic insights for practitioners that aspire to support such motors of innovation.functions of technological innovation systems; cumulative causation; automotive natural gas.

    Small unmanned airborne systems to support oil and gas pipeline monitoring and mapping

    Get PDF
    Acknowledgments We thank Johan Havelaar, Aeryon Labs Inc., AeronVironment Inc. and Aeronautics Inc. for kindly permitting the use of materials in Fig. 1.Peer reviewedPublisher PD

    Does Infrastructure Investment Lead to Economic Growth or Economic Fragility? Evidence from China

    Full text link
    The prevalent view in the economics literature is that a high level of infrastructure investment is a precursor to economic growth. China is especially held up as a model to emulate. Based on the largest dataset of its kind, this paper punctures the twin myths that, first, infrastructure creates economic value, and, second, China has a distinct advantage in its delivery. Far from being an engine of economic growth, the typical infrastructure investment fails to deliver a positive risk adjusted return. Moreover, China's track record in delivering infrastructure is no better than that of rich democracies. Where investments are debt-financed, overinvesting in unproductive projects results in the buildup of debt, monetary expansion, instability in financial markets, and economic fragility, exactly as we see in China today. We conclude that poorly managed infrastructure investments are a main explanation of surfacing economic and financial problems in China. We predict that, unless China shifts to a lower level of higher-quality infrastructure investments, the country is headed for an infrastructure-led national financial and economic crisis, which is likely also to be a crisis for the international economy. China's infrastructure investment model is not one to follow for other countries but one to avoid

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management
    corecore