OFDM Relay Cognitive Radio Multiple Antennas Resource Allocation Full Duplex Spectrum Sensing Synchronization Spectrum Sharing Interference Cancellation Channel Estimation Feedback Heterogeneous Networks Bi-directional Energy Harvesting Stochastic Geometry HetNet relay networks FBMC Equalization channel capacity TVWS CDMA interference in-band full-duplex system Duplex MIMO Ultra Low Power C-V2V 5G Reliability SC-FDMA interference suppression D-TDD CLI indoor positioning reinforcement learning RSRP weighting - Computation offloading smart factory Cell-free multi-access edge computing estimated position overlapping —Device-to-device (D2D) estimated position updating mMIMO control overhead hybrid NR positioning Femtocell Rat-dependent positioning frame structure Zigbee body area networks channel estimation error Handoff CoMP User grouping power uncertainty ultra-dense small cell network mode selection antenna arrays 5G mobile communication UFMC resource block management inter user interference WVAN health care partial overlap GFDM Dynamic TDD Multi-user Receiver Number of training blocks Uplink SCMA system V2X Vehicular communication cross-link interference LTE-TDD FS-NOMA Location-based user fairness Mode 3 QR Factorization Metaheuristics P-NOMA non-orthogonal multiple access dynamic HetNet spectrum partitioning and 5G networks. massive connectivity non-orthogonal multiple access (NOMA) overloading DQN OTDOA distributed mode Communication range resource selection maximum likelihood method Resource sharing Power allocation packet delay
Status : Presented 
Date : 2017-01 
Title : Impact of Outdated Channel Estimation on Secure Opportunistic Relaying System 
Authors : Jonghyun Bang, Seokjung Kim, Taehyung Kim, and Daesik Hong 
Conference : ICEIC 2017 
Abstract : In this paper, we study an opportunistic relaying system with secrecy constraints, where a number of eavesdropper nodes may overhear the source message. To deal with this problem, we consider two relay selection strategies. The first scheme tries to reduce the overheard information at the eavesdroppers by choosing the relay having the lowest instantaneous signal-tonoise ratio (SNR) to them. The second strategy is a conventional relay selection that seeks the relay having the highest SNR to the destination. The system performance in terms of the achievable secrecy rate of the two schemes are analyzed and confirmed by Monte Carlo simulations. 
Download : https://mirinae.yonsei.ac.kr/?module=fil...le_srl=343 

.

List of Articles
No.
Status Datesort
» [ICEIC] Jonghyun Bang, Seokjung Kim, Taehyung Kim, and Daesik Hong, "Impact of Outdated Channel Estimation on Secure Opportunistic Relaying System," ICEIC 2017, Jan. 2017 file Presented  2017-01 
2 [ICEIC] Taehoon Kwon, Daesik Hong, "Bit Error Probability Performance Analysis of Full Duplex Relay System", ICEIC 2010, June 2010 file Presented  2010-06 
1 [ICEIC] Hano Wang, Jemin Lee and Daesik Hong, "Interference Reduction through Multi-hop Transmission in Cognitive Radios", ICEIC 2010, June 2010 file Presented  2010-06