transmission strategy
Recently Published Documents


TOTAL DOCUMENTS

321
(FIVE YEARS 76)

H-INDEX

21
(FIVE YEARS 6)

Author(s):  
Yuan Xing ◽  
Riley Young ◽  
Giaolong Nguyen ◽  
Maxwell Lefebvre ◽  
Tianchi Zhao ◽  
...  

2021 ◽  
Author(s):  
Xiaoying Liu ◽  
Haifeng Zheng ◽  
Kechen Zheng ◽  
Ping Hu

2021 ◽  
Author(s):  
Lydiah W. Kibe ◽  
Bridget W. Kimani ◽  
Collins Okoyo ◽  
Wyckliff P. Omondi ◽  
Hadley M. Sultani ◽  
...  

Abstract IntroductionA major pillar in the Kenya Neglected Tropical Diseases (NTD) breaking transmission strategy of 2019 -2023 is that of intensifying advocacy, coordination and partnerships in NTD control and elimination. The purpose of this study was to explore views and experiences of stakeholders and health workers on ways of improving Advocacy, Communication and Social Mobilization (ACSM) activities of MDA for LF programmes through participatory approaches in Kilifi County, Kenya.Methods: Two wards were purposely selected in Kaloleni sub county, Kilifi County where there was average treatment coverage of 56% in 2015, 50.5% in 2016. Qualitative data collection methods were employed which included participatory meetings with county stakeholders to understand their views, experiences and suggestions on how ACSM strategies can be improved in MDA for LF. 12 In-Depth Interviews (IDI) were conducted (six with opinion leaders and six with Community Health Extension Workers (CHEWs) and two Semi structured interviews (SSIs) were held with county and sub-county coordinators involved in MDA administration. The aim was better understanding their perceptions of the NTD program about ACSM, challenges to ACSM strategies, and ways to improve the strategies for ACSM in MDA for LF. Data was organized and classified into codes and themes using QSR NVIVO version 12.Results: The study observed a low participation of stakeholders in ACSM activities of MDA for LF and identified potential areas for stakeholders’ involvement to strengthen the activities. Challenges hindering effective implementation of ACSM activities included late delivery of Information Educational and Communication (IEC) and few IEC materials, insufficient funding, inadequate time allocated to reach to the assigned households with messages, messaging and packaging of information for dissemination and vastness of the area. The stakeholders recommended innovative strategies and techniques to improve ACSM activities.Discussion and Conclusion: The results of this study show key challenges to ACSM implementation of MDA for LF. Implementers need to pay attention to these challenges to enhance effectiveness of MDA in accordance to the Kenya NTD breaking transmission Strategy. ACSM efforts in MDA for LF control and elimination should be linked with overarching efforts to mainstream partnerships and coordination in control and elimination.


2021 ◽  
Author(s):  
Joydev Ghosh ◽  
Vishal Sharma ◽  
Huseyin Haci ◽  
Saurabh Singh ◽  
In-Ho Ra

The fifth-generation (5G) of cellular technology is currently being deployed over the world. In the next decade of mobile networks, beyond 5G (B5G) cellular networks with the under-development advanced technology enablers are expected to be a fully developed system that could offer tremendous opportunities for both enterprises and society at large. B5G in more ambitious scenarios will be capable to facilitate much-improved performance with the significant upgrade of the key parameters such as massive connectivity, ultra-reliable and low latency (URLL), spectral efficiency (SE) and energy efficiency (EE). Equipping non-orthogonal multiple access (NOMA) with other key drivers will help to explore systems’ applicability to cover a wide variety of applications to forge a path for future networks. NOMA empowers the networks with seamless connectivity and can provide a secure transmission strategy for the industrial internet of things (IIoT) anywhere and anytime. Despite being a promising candidate for B5G networks a comprehensive study that covers operating principles, fundamental features and technological feasibility of NOMA at mmWave massive MIMO communications is not available. To address this, a simulation-based comparative study between NOMA and orthogonal multiple access (OMA) techniques for mmWave massive multiple-input and multiple-output (MIMO) communications is presented with performance discussions and identifying technology gaps. Throughout the paper, aspects of operating principles, fundamental features and technological feasibility of NOMA are discussed. Also, it is demonstrated that NOMA not only has good adaptability but also can outperform other OMA techniques for mmWave massive MIMO communications. Some foreseeable challenges and future directions on applying NOMA to B5G networks are also provided.


2021 ◽  
Author(s):  
Joydev Ghosh ◽  
Vishal Sharma ◽  
Huseyin Haci ◽  
Saurabh Singh ◽  
In-Ho Ra

The fifth-generation (5G) of cellular technology is currently being deployed over the world. In the next decade of mobile networks, beyond 5G (B5G) cellular networks with the under-development advanced technology enablers are expected to be a fully developed system that could offer tremendous opportunities for both enterprises and society at large. B5G in more ambitious scenarios will be capable to facilitate much-improved performance with the significant upgrade of the key parameters such as massive connectivity, ultra-reliable and low latency (URLL), spectral efficiency (SE) and energy efficiency (EE). Equipping non-orthogonal multiple access (NOMA) with other key drivers will help to explore systems’ applicability to cover a wide variety of applications to forge a path for future networks. NOMA empowers the networks with seamless connectivity and can provide a secure transmission strategy for the industrial internet of things (IIoT) anywhere and anytime. Despite being a promising candidate for B5G networks a comprehensive study that covers operating principles, fundamental features and technological feasibility of NOMA at mmWave massive MIMO communications is not available. To address this, a simulation-based comparative study between NOMA and orthogonal multiple access (OMA) techniques for mmWave massive multiple-input and multiple-output (MIMO) communications is presented with performance discussions and identifying technology gaps. Throughout the paper, aspects of operating principles, fundamental features and technological feasibility of NOMA are discussed. Also, it is demonstrated that NOMA not only has good adaptability but also can outperform other OMA techniques for mmWave massive MIMO communications. Some foreseeable challenges and future directions on applying NOMA to B5G networks are also provided.


2021 ◽  
Author(s):  
Caixia Cai ◽  
Xiaoyan Xu ◽  
Han Hai ◽  
Xue-Qin Jiang ◽  
Runhe Qiu ◽  
...  

Abstract This paper designs two energy-efficient full-duplex transmission strategies to maximize energy efficiency (EE) of two-way amplify-and-forward relay (TWAFR) networks with simultaneous wireless information and power transfer. In the two designed transmission strategies, there are direct links (DLs) between two end nodes and the DLs can be used to convey more information. At the same time, one of the end nodes is considered battery limited and has the capability of energy harvesting from the received signals. With the first designed transmission strategy, the EE can be maximized by optimizing the power allocation, and the analytical expressions of optimal power allocation (OPA) are obtained with transformation of EE maximization problem. With the second transmission strategy, the EE can also be maximized by optimizing the power allocation, and the numerical solutions of OPA are obtained with alternating optimal algorithm. Simulations show that the EEs of the TWAFR networks can be improved with our two designed transmission strategies.


2021 ◽  
Author(s):  
Milad Tatar Mamaghani ◽  
Yi Hong

Unmanned aerial vehicles (UAVs) and Terahertz (THz) technology are envisioned to play paramount roles in next-generation wireless communications. Hence, this paper presents a novel secure UAV-assisted mobile relaying system operating at THz bands for data acquisition from multiple ground user equipments towards a destination. We assume that the UAV-mounted relay may act, besides providing relaying services, as a potential adversary called the untrusted UAV relay. To safeguard end-to-end communications, we present a secure two-phase transmission strategy with cooperative jamming. Then, we formulate an optimization problem in terms of a new measure – secrecy energy efficiency (SEE), defined as the ratio of achievable average secrecy rate to average system power consumption, which enables us to obtain the best possible security level while taking UAV's inherent flight power limitation into account. This optimization problem leads to a joint design of key system parameters, including UAV's trajectory and velocity, communication scheduling, and power allocations. Since the formulated problem is a mixed-integer nonconvex optimization and computationally intractable, we propose alternative algorithms to solve it efficiently via greedy/sequential block coordinated descent, successive convex approximation, and non-linear fractional programming techniques. Numerical results demonstrate significant SEE performance improvement of our designs when compared to other known benchmarks.


2021 ◽  
Author(s):  
Milad Tatar Mamaghani ◽  
Yi Hong

Unmanned aerial vehicles (UAVs) and Terahertz (THz) technology are envisioned to play paramount roles in next-generation wireless communications. Hence, this paper presents a novel secure UAV-assisted mobile relaying system operating at THz bands for data acquisition from multiple ground user equipments towards a destination. We assume that the UAV-mounted relay may act, besides providing relaying services, as a potential adversary called the untrusted UAV relay. To safeguard end-to-end communications, we present a secure two-phase transmission strategy with cooperative jamming. Then, we formulate an optimization problem in terms of a new measure – secrecy energy efficiency (SEE), defined as the ratio of achievable average secrecy rate to average system power consumption, which enables us to obtain the best possible security level while taking UAV's inherent flight power limitation into account. This optimization problem leads to a joint design of key system parameters, including UAV's trajectory and velocity, communication scheduling, and power allocations. Since the formulated problem is a mixed-integer nonconvex optimization and computationally intractable, we propose alternative algorithms to solve it efficiently via greedy/sequential block coordinated descent, successive convex approximation, and non-linear fractional programming techniques. Numerical results demonstrate significant SEE performance improvement of our designs when compared to other known benchmarks.


Sign in / Sign up

Export Citation Format

Share Document