transmit power
Recently Published Documents


TOTAL DOCUMENTS

923
(FIVE YEARS 226)

H-INDEX

33
(FIVE YEARS 9)

Author(s):  
Paurav Goel ◽  
Avtar Singh ◽  
Ashok Goel

Underutilized radio frequencies are the chief apprehension in advance radio communication. The radio recourses are sparse and costly and their efficient allocation has become a challenge. Cognitive radio networks are the ray of hope. Cognitive radio networks use dynamic spectrum access technique to opportunistically retrieve and share the licensed spectrum. The licensed users are called primary users and the users that opportunistically access the licensed spectrum all called secondary users. The proposed system is a feedback system that work on demand and supply concept, in which secondary receivers senses the vacant spectrum and shares the information with the secondary transmitters. The secondary transmitters adjust their transmission parameters of transmit power and data rate in such a way that date rate is maximized. Two methods of spectrum access using frequency division multiple access (FDMA) and Time division multiple access (TDMA) are discussed. Interference temperature limit and maximum achievable capacity are the constraints that regulate the entire technique. The aim of the technique is to control the transmitter power according to the data requirements of each secondary user and optimizing the resources like bandwidth, transmit power using machine learning and feed forward back propagation deep neural networks making full use of the network capacity without hampering the operation of primary network.


Sensors ◽  
2021 ◽  
Vol 22 (1) ◽  
pp. 223
Author(s):  
Ahmad Sawalmeh ◽  
Noor Shamsiah Othman ◽  
Guanxiong Liu ◽  
Abdallah Khreishah ◽  
Ali Alenezi ◽  
...  

Unmanned aerial vehicles (UAVs) can be deployed as backup aerial base stations due to cellular outage either during or post natural disaster. In this paper, an approach involving multi-UAV three-dimensional (3D) deployment with power-efficient planning was proposed with the objective of minimizing the number of UAVs used to provide wireless coverage to all outdoor and indoor users that minimizes the required UAV transmit power and satisfies users’ required data rate. More specifically, the proposed algorithm iteratively invoked a clustering algorithm and an efficient UAV 3D placement algorithm, which aimed for maximum wireless coverage using the minimum number of UAVs while minimizing the required UAV transmit power. Two scenarios where users are uniformly and non-uniformly distributed were considered. The proposed algorithm that employed a Particle Swarm Optimization (PSO)-based clustering algorithm resulted in a lower number of UAVs needed to serve all users compared with that when a K-means clustering algorithm was employed. Furthermore, the proposed algorithm that iteratively invoked a PSO-based clustering algorithm and PSO-based efficient UAV 3D placement algorithms reduced the execution time by a factor of ≈1/17 and ≈1/79, respectively, compared to that when the Genetic Algorithm (GA)-based and Artificial Bees Colony (ABC)-based efficient UAV 3D placement algorithms were employed. For the uniform distribution scenario, it was observed that the proposed algorithm required six UAVs to ensure 100% user coverage, whilst the benchmarker algorithm that utilized Circle Packing Theory (CPT) required five UAVs but at the expense of 67% of coverage density.


Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8198
Author(s):  
Juan Sun ◽  
Shubin Zhang ◽  
Kaikai Chi

This paper investigates the secrecy communication in an underlay cognitive radio (CR) networks with one primary user (PU) as well as multiple PUs, where the radio frequency (RF) energy-harvesting secondary user (SU) transmits the confidential information to the destination in the presence of a potential eavesdropper. We introduce a RF energy-harvesting secondary jammer (SJ) to secure the SU transmissions. The system works in time slots, where each time slot is divided into the energy transfer (ET) phase and the information transfer (IT) phase. In ET phase, the SU and SJ capture energy from the PU transmissions; in the IT phase, the SU uses the harvested energy to transmit information to the destination without causing the harmful interference to the PU transmissions, while the SJ utilizes the captured energy to generate jamming signals to the eavesdropper to secure the SU transmissions. We aim to maximize the secrecy rate for SU transmissionsby jointly optimizing the time allocation between ET phase and IT phase and the transmit power allocation at the SU and SJ. We first formulate the secrecy rate maximization as non-convex optimization problems. Then, we propose efficient nested form algorithms for the non-convex problems. In the outer layer, we obtain the optimal time allocation by the one dimension search method. In the inner layer, we obtain the optimal transmit power allocation by the DC programming, where the Lagrange duality method is employed to solve the convex approximation problem. Simulation results verify that the proposed schemes essentially improve the secrecy rate of the secondary network as compared to the benchmark schemes.


2021 ◽  
Author(s):  
Yongjun Sun ◽  
Liaoping Zhang ◽  
Zujun Liu

Abstract In this paper, the scenario in which multiple unmanned aerial vehicles (UAVs) provide service to ground users is considered. Under the condition of satisfying the minimum rate per user and system load balance, the user association, bandwidth allocation and three dimensional (3D) deployment of multi-UAV networks are optimized jointly to minimize the total downlink transmit power of UAVs. Since the problem is hard to solve directly, it is decomposed into three sub-problems, and then the problem is solved by alternating iteration algorithm. First, when the UAV’s location is determined, a modified K-means algorithm is used to obtain balanced user clustering. Then, when the user association and UAV’s 3D deployment are determined, the convex optimization method is used to obtain the optimal bandwidth allocation. Finally, when the user association and optimal bandwidth allocation are determined, a modified differential evolution algorithm is proposed to optimize the 3D location of the UAVs. Simulation results show that the proposed algorithm can effectively reduce the transmit power of UAVs compared with the existing algorithms under the conditions of satisfying the minimum rate of ground users and system load balance.


2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Thanh-Luan Nguyen ◽  
Duy-Hung Ha ◽  
Phu Tran Tin ◽  
Nguyen Van Vinh

This paper studies the joint impact of simultaneous wireless information and power transfer (SWIPT) and nonorthogonal multiple access (NOMA) to the cooperative relay (CoR) network where direct links exist. Over Nakagami-m fading environments, the near users employ decode-and-forward (DF) and energy harvesting (EH) to assist the transmission from the source to the far users. Exploiting the time-switching protocol (TSP) and power-splitting protocol (PSP) to the CoR-based NOMA system, analytical results for the outage probability are derived, and the corresponding throughput is obtained. Comparative results show that the PSP outperforms the TSP at low transmit power, while at high-transmit-power regime, the TSP provides similar performance as the PSP.


2021 ◽  
Vol 11 (23) ◽  
pp. 11248
Author(s):  
Brecht De Beelde ◽  
David Plets ◽  
Wout Joseph

With the deployment of data-driven assembly and production factories, challenges arise in sensor data acquisition and gathering. Different wireless technologies are currently used for transferring data, each with different advantages and constraints. In this paper, we present a hybrid network architecture for providing Quality of Service (QoS) in an industrial environment where guaranteed minimal data rates and maximal latency are of utmost importance for controlling devices and processes. The location of the access points (APs) is determined during the initial network-planning action, together with physical parameters such as frequency, transmit power, and modulation and coding schemes. Instead of performing network-planning just once before the network rollout, the network is monitored continuously by adding telemetry data to the frame header of all data streams, and the network is automatically reconfigured in real-time if the requirements are not met. By not using maximum transmit powers during the initial roll-out, more APs are needed, but coverage is guaranteed when new obstructions such as metallic racks or machinery are added. It is found that decreasing the transmit power by 6 dB gives the best trade-off between the number of required APs and network robustness. The proposed architecture is validated via simulations and via a proof-of-concept setup.


Sensors ◽  
2021 ◽  
Vol 21 (23) ◽  
pp. 7837
Author(s):  
Kisong Lee

In this study, wireless-powered cognitive radio networks (WPCRNs) are considered, in which N sets of transmitters, receivers and energy-harvesting (EH) nodes in secondary networks share the same spectrum with primary users (PUs) and none of the EH nodes is allowed to decode information but can harvest energy from the signals. Given that the EH nodes are untrusted nodes from the point of view of information transfer, the eavesdropping of secret information can occur if they decide to eavesdrop on information instead of harvesting energy from the signals transmitted by secondary users (SUs). For secure communications in WPCRNs, we aim to find the optimal transmit powers of SUs that maximize the average secrecy rate of SUs while maintaining the interference to PUs below an allowable level, while guaranteeing the minimum EH requirement for each EH node. First, we derive an analytical expression for the transmit power via dual decomposition and propose a suboptimal transmit power control algorithm, which is implemented in an iterative manner with low complexity. The simulation results confirm that the proposed scheme outperforms the conventional distributed schemes by more than 10% in terms of the average secrecy rate and outage probability and can also considerably reduce the computation time compared with the optimal scheme.


Sensors ◽  
2021 ◽  
Vol 21 (22) ◽  
pp. 7653
Author(s):  
Phu Tran Tin ◽  
Van-Duc Phan ◽  
Tan N. Nguyen ◽  
Lam-Thanh Tu ◽  
Bui Vu Minh ◽  
...  

In the present paper, we investigate the performance of the simultaneous wireless information and power transfer (SWIPT) based cooperative cognitive radio networks (CCRNs). In particular, the outage probability is derived in the closed-form expressions under the opportunistic partial relay selection. Different from the conventional CRNs in which the transmit power of the secondary transmitters count merely on the aggregate interference measured on the primary networks, the transmit power of the SWIPT-enabled transmitters is also constrained by the harvested energy. As a result, the mathematical framework involves more correlated random variables and, thus, is of higher complexity. Monte Carlo simulations are given to corroborate the accuracy of the mathematical analysis and to shed light on the behavior of the OP with respect to several important parameters, e.g., the transmit power and the number of relays. Our findings illustrate that increasing the transmit power and/or the number of relays is beneficial for the outage probability.


Sign in / Sign up

Export Citation Format

Share Document