Cooperative communication through energy harvested relays in Cognitive Internet of Things(CIoT)has been envisioned as a promising solution to support massive connectivity of Cognitive Radio(CR)based IoT devices and to...
详细信息
Cooperative communication through energy harvested relays in Cognitive Internet of Things(CIoT)has been envisioned as a promising solution to support massive connectivity of Cognitive Radio(CR)based IoT devices and to achieve maximal energy and spectral efficiency in upcoming wireless *** this work,a cooperative CIoT system is contemplated,in which a source acts as a satellite,communicating with multiple CIoT devices over numerous *** Aerial Vehicles(UAVs)are used as relays,which are equipped with onboard Energy Harvesting(EH)*** adopted a Power Splitting(PS)method for EH at relays,which are harvested from the Radio frequency(RF)*** conjunction with this,the Decode and Forward(DF)relaying strategy is used at UAV relays to transmit the messages from the satellite source to the CIoT *** developed a Multi-Objective Optimization(MOO)framework for joint optimization of source power allocation,CIoT device selection,UAV relay assignment,and PS ratio *** formulated three objectives:maximizing the sum rate and the number of admitted CIoT in the network and minimizing the carbon dioxide *** MOO formulation is a Mixed-Integer Non-Linear programming(MINLP)problem,which is challenging to *** address the joint optimization problem for an epsilon optimal solution,an Outer Approximation Algorithm(OAA)is proposed with reduced *** simulation results show that the proposed OAA is superior in terms of CIoT device selection and network utility maximization when compared to those obtained using the Nonlinear Optimization with Mesh Adaptive Direct-search(NOMAD)algorithm.
Offset quadrature amplitude modulation-based filter bank multicarrier (FBMC-OQAM) method is a promising technology for future wireless communication systems. It offers several advantages over traditional orthogonal fr...
详细信息
Due to an increase in the number of users and a high demand for high data rates, researchers have resorted to boosting the capacity and spectral efficiency of the next-generation wireless communication. With a limited...
详细信息
To accommodate the wide range of input voltages supplied by redundant batteries and ensure an adequate hold-up time for communication systems during utility power failures, power supplies used in 5 G base stations typ...
详细信息
OpenAI and ChatGPT, as state-of-the-art languagemodels driven by cutting-edge artificial intelligence technology,have gained widespread adoption across diverse industries. In the realm of computer vision, these models...
详细信息
OpenAI and ChatGPT, as state-of-the-art languagemodels driven by cutting-edge artificial intelligence technology,have gained widespread adoption across diverse industries. In the realm of computer vision, these models havebeen employed for intricate tasks including object recognition, image generation, and image processing, leveragingtheir advanced capabilities to fuel transformative breakthroughs. Within the gaming industry, they have foundutility in crafting virtual characters and generating plots and dialogues, thereby enabling immersive and interactiveplayer experiences. Furthermore, these models have been harnessed in the realm of medical diagnosis, providinginvaluable insights and support to healthcare professionals in the realmof disease detection. The principal objectiveof this paper is to offer a comprehensive overview of OpenAI, OpenAI Gym, ChatGPT, DALL E, stable diffusion,the pre-trained clip model, and other pertinent models in various domains, encompassing CLIP Text-to-Image,education, medical imaging, computer vision, social influence, natural language processing, software development,coding assistance, and Chatbot, among others. Particular emphasis will be placed on comparative analysis andexamination of popular text-to-image and text-to-video models under diverse stimuli, shedding light on thecurrent research landscape, emerging trends, and existing challenges within the domains of OpenAI and *** a rigorous literature review, this paper aims to deliver a professional and insightful overview of theadvancements, potentials, and limitations of these pioneering language models.
Resolvers are widely employed as position sensors to detect both rotational and linear displacement. Among the various types, wound rotor (WR) resolvers offer superior accuracy in absolute measurements, especially und...
详细信息
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel...
详细信息
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation.
Modulation depth and its associated loss pose a significant challenge in electro-optical telecommunication systems. Optimal modulators strive to enhance modulation depth while minimizing loss rates. We propose a high-...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Securi...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Security (PLS). Ensuring data confidentiality and integrity during wireless communications poses a primary challenge in IoT environments. Additionally, within the constrained frequency bands available, Cognitive Radio Networks (CRNs) has emerged as an urgent necessity to optimize spectrum utilization. This technology enables intelligent management of radio frequencies, enhancing network efficiency and adaptability to dynamic environmental changes. In this research, we focus on examining the PLS for the primary channel within the underlying CRNs. Our proposed model involves a primary source-destination pair and a secondary transmitter-receiver pair sharing the same frequency band simultaneously. In the presence of a common eavesdropper, the primary concern lies in securing the primary link communication. The secondary user (SU) acts as cooperative jamming, strategically allocating a portion of its transmission power to transmit artificial interference, thus confusing the eavesdropper and protecting the primary user's (PU) communication. The transmit power of the SU is regulated by the maximum interference power tolerated by the primary network's receiver. To evaluate the effectiveness of our proposed protocol, we develop closed-form mathematical expressions for intercept probability ((Formula presented.)) and outage probability (OP) along the primary communication link. Additionally, we derive mathematical expressions for OP along the secondary communications network. Furthermore, we investigate the impact of transmit power allocation on intercept and outage probabilities across various links. Through both simulation and theoretical analysis, our protocol aims to enhance protection and outage efficiency for the primary link while ensuring appropriate secondary
暂无评论