OFDM Relay Cognitive Radio Multiple Antennas Resource Allocation Full Duplex Spectrum Sensing Synchronization Spectrum Sharing Channel Estimation Interference Cancellation Stochastic Geometry Energy Harvesting Feedback Bi-directional Heterogeneous Networks Equalization HetNet relay networks FBMC Ultra Low Power SC-FDMA TVWS Duplex Reliability CDMA MIMO interference channel capacity in-band full-duplex system interference suppression 5G C-V2V reinforcement learning RSRP weighting non-orthogonal multiple access (NOMA) health care 5G mobile communication indoor positioning Vehicle-to-vehicle communication estimated position overlapping Resource sharing Power allocation multi-access edge computing control overhead hybrid Rat-dependent positioning NR positioning smart factory UFMC Handoff Femtocell QAM CoMP power uncertainty - Computation offloading amplify and forward communication Zigbee body area networks resource block management frame structure WVAN inter user interference GFDM mode selection antenna arrays partial overlap LTE-based V2V resource selection maximum likelihood method Communication range Number of training blocks Vehicular communication Uplink SCMA system Dynamic TDD QR Factorization Metaheuristics FS-NOMA cross-link interference user fairness Multi-user Receiver Mode 3 V2X P-NOMA dynamic HetNet spectrum partitioning DQN D-TDD CLI massive connectivity and 5G networks. OTDOA estimated position updating distributed mode non-orthogonal multiple access Spatial capacity LTE-TDD —Device-to-device (D2D) Location-based overloading
Status : Presented 
Date : 2017-01 
Title : Impact of Outdated Channel Estimation on Secure Opportunistic Relaying System 
Authors : Jonghyun Bang, Seokjung Kim, Taehyung Kim, and Daesik Hong 
Conference : ICEIC 2017 
Abstract : In this paper, we study an opportunistic relaying system with secrecy constraints, where a number of eavesdropper nodes may overhear the source message. To deal with this problem, we consider two relay selection strategies. The first scheme tries to reduce the overheard information at the eavesdroppers by choosing the relay having the lowest instantaneous signal-tonoise ratio (SNR) to them. The second strategy is a conventional relay selection that seeks the relay having the highest SNR to the destination. The system performance in terms of the achievable secrecy rate of the two schemes are analyzed and confirmed by Monte Carlo simulations. 
Download : https://mirinae.yonsei.ac.kr/?module=fil...le_srl=343 

.

List of Articles
No.
Statussort Date
» [ICEIC] Jonghyun Bang, Seokjung Kim, Taehyung Kim, and Daesik Hong, "Impact of Outdated Channel Estimation on Secure Opportunistic Relaying System," ICEIC 2017, Jan. 2017 file Presented  2017-01 
2 [ICEIC] Taehoon Kwon, Daesik Hong, "Bit Error Probability Performance Analysis of Full Duplex Relay System", ICEIC 2010, June 2010 file Presented  2010-06 
1 [ICEIC] Hano Wang, Jemin Lee and Daesik Hong, "Interference Reduction through Multi-hop Transmission in Cognitive Radios", ICEIC 2010, June 2010 file Presented  2010-06