Energy harvesting from ambient radio-frequency (RF) sources has been a novel approach for extending the lifetime of wireless networks. In this paper, a cooperative device-to-device (D2D) system with the aid of energy-constrained relay is considered. The relays are assumed to be able to harvest energy from information signal and co-channel interference (CCI) signals broadcasted by nearby traditional cellular users and forward the source’s signal to its desired destination (D2D user) utilizing amplify-andforward (AF) relaying protocol. Time switching protocol (TSR) and power splitting protocol (PSR) are proposed to assist energy harvesting and information processing at the relay. The proposed approaches are applied in a model with three nodes including the source (D2D user), the relay and the destination (D2D user), the system throughput is investigated in terms of the ergodic capacity and the outage capacity, where the analytical results are obtained approximately. Our numerical results verify the our derivations, and also points out the impact of CCI on system performance. Finally, this investigation provide fundamental design guidelines for selecting hardware of energy harvesting circuits that satisfies the requirements of a practical cooperative D2D system.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document summarizes a presentation on analyzing massive MIMO systems under different wireless scenarios. It begins with background on mobile communication generations and challenges with exponentially growing data demand. It then discusses massive MIMO as a promising technology for 5G, noting it can support large numbers of users simultaneously and increase spectrum efficiency. However, challenges include hardware mismatch in TDD systems and highly correlated spatial gains. The presentation outlines analyzing the impact of these issues, as well as the feasibility of massive MIMO in cooperative networks. It proposes modeling hardware mismatch and deriving the probability distribution functions of amplitude and phase mismatches. It also discusses using different precoding techniques like zero-forcing to calculate signal-to-interference-plus-noise ratio in the down
Throughput maximization in multiuser wireless powered communication network b...paperpublications3
Abstract: WPCN (wireless powered communication network) is the newly emerging network in which an access point called hybrid access point (HP) broadcast energy in the downlink and in the upper link wireless information transfer take place from sensors to hybrid access point. A protocol called “harvest-thentransmit” protocol is proposed where all users first harvest the wireless energy from the H-AP, in the downlink (DL) and then send their independent information to the HAP in the uplink (UL) by time-division-multiple-access (TDMA). A set of relay nodes used in the network enhances the over all throughput than sum throughput and common through hput. More energy efficient network can be got by using relay nodes. Simulation result showing the priority of the network that using relay nodes than other ordinary wireless sensor networks.
A review of Wireless Information and Power Transfer in Multiuser OFDM SystemsIJERA Editor
We study the resource allocation algorithm design for multiuser orthogonal frequency division multiplexing
(OFDM) downlink systems with simultaneous wireless information and power transfer. The algorithm design is
formulated as a non-convex optimization problem for maximizing the energy efficiency of data transmission
(bit/Joule delivered to the users). In particular, the problem formulation takes into account the minimum
required system data rate, heterogeneous minimum required power transfers to the users, and the circuit power
consumption. Subsequently, by exploiting the method of timesharing and the properties of nonlinear fractional
programming, the considered non-convex optimization problem is solved using an efficient iterative resource
allocation algorithm. Recently, simultaneous wireless information and power transfer (SWIPT) becomes
appealing by essentially providing a perpetual energy source for the wireless networks. For the TDMA-based
information transmission, we employ TS at the receivers; for the OFDMA-based information transmission, we
employ PS at the receivers. Under the above two scenarios, we address the problem of maximizing the weighted
sum-rate over all users by varying the time/frequency power allocation and either TS or PS ratio, subject to a
minimum harvested energy constraint on each user as well as a peak and/or total transmission power constraint.
Implement of multiple access technique by wireless power transfer and relayin...journalBEEI
In this paper, we investigate non-orthogonal multiple access (NOMA) network relying on wireless power transfer to prolong lifetime. The base station (BS) sends common signals to the relay with two functions (energy harvesting (EH) and signal processing) to further serve two NOMA users in downlink. Performance gap exists since different power allocation factor assigned from power splitting protocol adopted at the relay and such relay employs both amplify-and-forward (AF) and decode-and-forward schemes. To provide performance metrics, we prove formulas of the outage probability which is a function of transmit signal to noise ratio. Simulation results indicate specific parameters to adjust system performance of two user in the considered EH-NOMA system. This finding is important recommendation to design EH-NOMA which shows particular outage performance at required target rates.
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSNIRJET Journal
This document proposes an energy efficient routing protocol for wireless sensor networks called Enhanced K-Means Cluster-based Routing Protocol. It uses K-means clustering to divide nodes into clusters. Unlike other protocols, it considers an optimal fixed packet size based on radio parameters and channel conditions to decrease energy consumption. It also uses varying power levels for communication between cluster heads and members. Simulation results show it performs better than the conventional K-means based energy aware clustering protocol in terms of network lifetime and overall throughput.
Prolong Lifetime Analysis and Efficient Utilization of Energy in Heterogeneou...IJTET Journal
Abstract - The clustering-based protocols are believed to be the best for heterogeneous wireless sensor networks (WSNs). The evaluation is based on two new clustering-based protocols, which are called single-hop energy-efficient clustering protocol (S-EECP) and multi-hop energy-efficient clustering protocol (M-EECP) [1]. In S-EECP, the cluster heads (CHs) are elected by a weighted probability [2] based on the ratio between average energy of the network and residual energy of each node. The nodes having more initial energy and residual energy will have more chances to be elected as CHs than nodes with low energy. In M-EECP, the election of CHs is same as S-EECP, but the elected CHs communicate the data packets to the base station via multi-hop communication approach. To analyze the network lifetime three types of sensor nodes equipped with different battery energy are assumed. By analyzing these parameters, M-EECP achieves load balance among the CHs better than the existing clustering protocols and gives prolong network lifetime. Here the simulation is based on ns-2 simulator.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document summarizes a presentation on analyzing massive MIMO systems under different wireless scenarios. It begins with background on mobile communication generations and challenges with exponentially growing data demand. It then discusses massive MIMO as a promising technology for 5G, noting it can support large numbers of users simultaneously and increase spectrum efficiency. However, challenges include hardware mismatch in TDD systems and highly correlated spatial gains. The presentation outlines analyzing the impact of these issues, as well as the feasibility of massive MIMO in cooperative networks. It proposes modeling hardware mismatch and deriving the probability distribution functions of amplitude and phase mismatches. It also discusses using different precoding techniques like zero-forcing to calculate signal-to-interference-plus-noise ratio in the down
Throughput maximization in multiuser wireless powered communication network b...paperpublications3
Abstract: WPCN (wireless powered communication network) is the newly emerging network in which an access point called hybrid access point (HP) broadcast energy in the downlink and in the upper link wireless information transfer take place from sensors to hybrid access point. A protocol called “harvest-thentransmit” protocol is proposed where all users first harvest the wireless energy from the H-AP, in the downlink (DL) and then send their independent information to the HAP in the uplink (UL) by time-division-multiple-access (TDMA). A set of relay nodes used in the network enhances the over all throughput than sum throughput and common through hput. More energy efficient network can be got by using relay nodes. Simulation result showing the priority of the network that using relay nodes than other ordinary wireless sensor networks.
A review of Wireless Information and Power Transfer in Multiuser OFDM SystemsIJERA Editor
We study the resource allocation algorithm design for multiuser orthogonal frequency division multiplexing
(OFDM) downlink systems with simultaneous wireless information and power transfer. The algorithm design is
formulated as a non-convex optimization problem for maximizing the energy efficiency of data transmission
(bit/Joule delivered to the users). In particular, the problem formulation takes into account the minimum
required system data rate, heterogeneous minimum required power transfers to the users, and the circuit power
consumption. Subsequently, by exploiting the method of timesharing and the properties of nonlinear fractional
programming, the considered non-convex optimization problem is solved using an efficient iterative resource
allocation algorithm. Recently, simultaneous wireless information and power transfer (SWIPT) becomes
appealing by essentially providing a perpetual energy source for the wireless networks. For the TDMA-based
information transmission, we employ TS at the receivers; for the OFDMA-based information transmission, we
employ PS at the receivers. Under the above two scenarios, we address the problem of maximizing the weighted
sum-rate over all users by varying the time/frequency power allocation and either TS or PS ratio, subject to a
minimum harvested energy constraint on each user as well as a peak and/or total transmission power constraint.
Implement of multiple access technique by wireless power transfer and relayin...journalBEEI
In this paper, we investigate non-orthogonal multiple access (NOMA) network relying on wireless power transfer to prolong lifetime. The base station (BS) sends common signals to the relay with two functions (energy harvesting (EH) and signal processing) to further serve two NOMA users in downlink. Performance gap exists since different power allocation factor assigned from power splitting protocol adopted at the relay and such relay employs both amplify-and-forward (AF) and decode-and-forward schemes. To provide performance metrics, we prove formulas of the outage probability which is a function of transmit signal to noise ratio. Simulation results indicate specific parameters to adjust system performance of two user in the considered EH-NOMA system. This finding is important recommendation to design EH-NOMA which shows particular outage performance at required target rates.
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSNIRJET Journal
This document proposes an energy efficient routing protocol for wireless sensor networks called Enhanced K-Means Cluster-based Routing Protocol. It uses K-means clustering to divide nodes into clusters. Unlike other protocols, it considers an optimal fixed packet size based on radio parameters and channel conditions to decrease energy consumption. It also uses varying power levels for communication between cluster heads and members. Simulation results show it performs better than the conventional K-means based energy aware clustering protocol in terms of network lifetime and overall throughput.
Prolong Lifetime Analysis and Efficient Utilization of Energy in Heterogeneou...IJTET Journal
Abstract - The clustering-based protocols are believed to be the best for heterogeneous wireless sensor networks (WSNs). The evaluation is based on two new clustering-based protocols, which are called single-hop energy-efficient clustering protocol (S-EECP) and multi-hop energy-efficient clustering protocol (M-EECP) [1]. In S-EECP, the cluster heads (CHs) are elected by a weighted probability [2] based on the ratio between average energy of the network and residual energy of each node. The nodes having more initial energy and residual energy will have more chances to be elected as CHs than nodes with low energy. In M-EECP, the election of CHs is same as S-EECP, but the elected CHs communicate the data packets to the base station via multi-hop communication approach. To analyze the network lifetime three types of sensor nodes equipped with different battery energy are assumed. By analyzing these parameters, M-EECP achieves load balance among the CHs better than the existing clustering protocols and gives prolong network lifetime. Here the simulation is based on ns-2 simulator.
Modelling of a time modulated ultra-wideband communication linkIAEME Publication
This document summarizes the modeling of a time-modulated ultra-wideband (TM UWB) communication link. It describes:
1) How TM UWB signals are generated using time-hopping and pulse-position modulation to transmit data bits.
2) The modeling of an additive white Gaussian noise channel and a correlator receiver to detect signals.
3) The results of simulating a 200-bit transmission, showing UWB pulses are distorted by noise but the original data can be recovered by correlation and integration at the receiver.
Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...IJECEIAES
Conservation of the energy is one of the main design issues in wireless sensor networks. The limited battery power of each sensor node is a challenging task in deploying this type of network. The challenge is crucial in reliable wireless network when implementing efficient error correcting scheme with energy consuming routing protocol. In this work, we investigated the energy performance of LDPC code in multi-hop wireless sensor network. We proposed a model of two base stations to prolong the lifetime and build a reliable and energy-efficient network. Through performed MATLAB simulations, we examine the energy effectiveness of multiple base stations model on reliable wireless sensor network performance in different network dimensions.
All optical network design with even and odd nodeseSAT Journals
Abstract
We have studied the effects of OLTs and OADMs in WDM optical networks. All optical networks have proved to be cost efficient
and power saving in comparison to O-E-O networks. Cost of a network can further be reduced by minimizing the number of IP
router ports and the number of wavelengths required. It has been already studied the number of IP router ports required per node
and number of wavelengths required to carry a fixed amount of traffic, considering the network containing even and odd number
of routing nodes. And finally the result has been compared with other architectures like point to point WDM and hub networks,
finally all-optical networks proved to be most cost efficient in saving number of wavelength requirements and IP router port
requirements. In this paper we have compared all-optical network with itself, by taking even and odd number of nodes. That is we
have compared all-optical network containing even number of nodes with the same all-optical network containing odd number of
nodes. The result what we obtained is to honor same amount of traffic “t”, all-optical network containing odd number of nodes
require lesser number of wavelengths than its previous even number of nodes. We have here varied the number of nodes keeping
the amount of traffic fixed assuming static routing for simplicity of our work. Finally we observed the percentage of change in
wavelength requirements decreases on increasing number of nodes. That is for a large network number of wavelength
requirements are large for even number of nodes than odd number of nodes. But this difference is little more for a small network
size.
Keywords: Wavelength Division Multiplexing (WDM), PPWDM (Point to point WDM), Light paths, traffic, alloptical,
Erlang(E).
A new look on CSI imperfection in downlink NOMA systemsjournalBEEI
- The document analyzes the performance of downlink non-orthogonal multiple access (NOMA) systems under imperfect channel state information (CSI) and Nakagami-m fading.
- It derives closed-form expressions for the outage probability of two users in such NOMA systems considering the joint impact of imperfect CSI and Nakagami-m fading.
- Monte Carlo simulations are conducted to verify the accuracy of the analytical outage probability expressions derived for the two users under the system and channel models considered.
This document presents a MATLAB Simulink model of a QPSK modulated reusable UWB-based optical network. Key aspects include:
1) The model simulates a WDM PON system using QPSK modulation to transmit data over single mode fiber, with and without wavelength reuse from downstream UWB signals.
2) System performance is evaluated by measuring BER and SNR over increasing fiber lengths.
3) Results show that wavelength reuse does not degrade performance, as SNR and BER values closely resemble the non-reuse method over transmission lengths up to 40,000km.
4) The study demonstrates an effective method for wavelength reuse in optical networks to reduce implementation costs without compromising performance.
Review on Massive MIMO (Multiple Input Multiple Output)IRJET Journal
This document provides an overview of massive MIMO (Multiple Input Multiple Output) technology. Massive MIMO involves using a large number (tens to hundreds) of antennas at base stations to serve multiple single-antenna users simultaneously. It can dramatically increase network capacity and spectral efficiency while improving energy efficiency. Challenges include developing accurate channel models, addressing issues like pilot contamination, and designing low-cost hardware to implement massive MIMO on a large scale. Overall, massive MIMO is seen as a promising technology to meet future wireless communication needs but requires further research to realize its full potential benefits.
Lantiq/Intel Contributions to G.fast at Scientific ConferencesLantiq
This document summarizes research on achievable data rates for hybrid copper/fiber networks using G.fast technology. It finds that linear precoding methods like zero-forcing perform well for shorter copper line lengths, while nonlinear methods have advantages for longer lines. The work analyzes performance losses from implementation limitations and proposes optimizing the transmit spectrum to improve achievable rates by incorporating these limitations into the optimization process. Rate-reach curves are generated based on a statistical channel model and constraints from the G.fast standard.
Joint impacts of relaying scheme and wireless power transfer in multiple acce...journalBEEI
This paper considers ergodic capacity of energy harvesting (EH) based cellular networks. Such a network employs non-orthogonal multiple access (NOMA) together with relaying scheme to serve two far users. In this system model, relay is facilitated power splitting (PS) protocol to implement energy harvesting (EH). To examine capacity, expressions of signal to noise ratio (SNR) need be computed to achieve capacity. Power allocation factors are different for two users in such system and hence performance gap happens to distinguish requirements for separated users. It can be confirmed that the proposed paradigm exhibits maximal achievable capacity in some scenarios of setting parameters. To confirm exactness of the analytical expressions and show advantages of the proposed EH-NOMA, simulation results are performed in terms of ergodic capacity.
Design and analysis of microstrip antenna with zig-zag feeder for wireless co...journalBEEI
This document describes the design and analysis of a microstrip antenna with a zig-zag feeder for wireless communication applications. The proposed antenna is designed to have a wide bandwidth of 2-14 GHz. It consists of a zig-zag microstrip feedline connected to a tuning stub printed on one side of a substrate. On the other side of the substrate is a ground plane with zig-zag slots. Parametric analysis was performed to optimize the dimensions for wide bandwidth and acceptable gain between 7.448-5.928 dB. The zig-zag feedline and tuning stub with elliptical slots help improve the impedance matching for wide bandwidth operation suitable for UWB applications. Simulation results for radiation patterns, current distribution, and
This document discusses generating sensor nodes and clustering for energy efficiency in wireless sensor networks (WSNs). It describes how sensor nodes are organized into clusters with a cluster head that communicates with the base station. The presentation proposes an algorithm for selecting the cluster head based on the node's distance to the base station and other nodes, with the goal of increasing network lifetime by optimizing energy consumption. Clustering helps reduce energy usage through data aggregation and limiting transmissions to cluster heads only.
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Snsijwmn
This document summarizes a new Energy-Degree Distance (EDD) Clustering Algorithm for wireless sensor networks. The algorithm aims to minimize energy consumption and balance energy usage among nodes. Key aspects of the EDD algorithm include electing cluster heads based on a node's remaining energy, degree, and distance to the base station. Simulation results show the EDD algorithm outperforms the LEACH algorithm in terms of network lifetime and energy efficiency. Both dynamic and static clustering methods are evaluated, with dynamic clustering showing better performance overall.
Rabid Euclidean direction search algorithm for various adaptive array geometriesjournalBEEI
This document summarizes the Rabid Euclidean direction search (REDS) algorithm for adaptive beamforming in different antenna array geometries. The REDS algorithm is analyzed for linear, circular, and planar array configurations. Simulation results show that the REDS algorithm provides significant improvements over other algorithms, including faster convergence, lower mean square error, better interference reduction, and lower sidelobe levels. Specifically, the REDS algorithm cyclically searches and updates weights along individual Euclidean directions to minimize error, offering computational advantages over algorithms like least mean square and recursive least squares.
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...IRJET Journal
This document discusses optimizing energy efficiency in wireless sensor networks through the use of particle swarm optimization (PSO) and flower pollination optimization (FPO) algorithms. It first provides background on wireless sensor networks and challenges with limited energy. It then proposes using PSO and FPO to determine optimal transmission rate control and power allocation to maximize energy efficiency. Simulation results showed that while PSO converges faster, FPO achieves better stability in optimizing energy efficiency, data transfer rate, transmission power, and power ratio. The document also discusses sources of power consumption and mechanisms to improve energy efficiency in wireless sensor networks, including clustering sensors and data aggregation.
IRJET- Energy Efficiency-Throughput Trade-Offs in 5GIRJET Journal
- The document examines the energy efficiency-throughput tradeoff of Massive MIMO networks and compares the circuit power consumption of different processing schemes.
- It presents a circuit power consumption model for the uplink and downlink of Massive MIMO base stations that accounts for components like transceiver chains, channel estimation, encoding, decoding, backhaul signaling, and signal processing.
- Using the model, it compares the circuit power of processing schemes like M-MMSE, S-MMSE, RZF, ZF, and MR for different antenna and user configurations and finds that schemes like RZF and ZF consume less circuit power than M-MMSE.
This document analyzes and compares the performance of different adaptive beamforming techniques for smart antennas. It describes switched beamforming, which uses fixed beams, and adaptive beamforming techniques that use algorithms like LMS, SMI, RLS, CGA, CMA, and LSCMA to form an adaptive beam. It simulates these algorithms using MATLAB for a uniform linear array and compares their ability to direct the main beam towards the desired user while nulling interference. The LMS, SMI, RLS, CMA and LSCMA algorithms are found to perform well at directing the beam to the desired user, with LMS having good interference rejection and RLS providing the fastest convergence but highest computational cost.
BER Performance of MU-MIMO System using Dirty Paper CodingIJEEE
In this paper Dirty Paper Coding for communication system is implemented. MIMO application that involves devices such as cell phones, pocket PCs require closely spaced antenna, which suffers from mutual coupling among antennas and high spatial correlation for signals. DPC is used for compensating the degradation due to correlation and mutual coupling.
In this paper, we consider one-way relay with energy harvesting system based on power beacon
(PB), in which the relay node harvests transmitted power from the PB station to forward signals to destination.
We also analyse the relay network model with amplify-and-forward (AF) protocol for information cooperation
and Power Splitting-based Relaying (PSR) protocol for power transfer. In particular, the outage probability
and optimal energy harvesting (EH) power splitting fraction of novel scheme in are presented. We obtain
analytical closed-form expression of optimal energy harvesting (EH) power splitting fraction to minimize the
outage probability of system. Using numerical and analytical simulations, the performances of different cases
are presented and discussed.
Physical security with power beacon assisted in half-duplex relaying networks...TELKOMNIKA JOURNAL
In this research, we proposed and investigated physical security with power beacon assisted in half-duplex relaying networks over a Rayleigh fading channel. In this model, the source (S) node communicates with the destination (D) node via the helping of the intermediate relay (R) node. The D and R nodes harvest energy from the power beacon (PB) node in the presence of a passive eavesdropper (E) node. Then we derived the integral form of the system outage probability (OP) and closed form of the intercept probability (IP). The correctness of the analytical of the OP and IP is verified by the Monte Carlo simulation. The influence of the main system parameters on the OP and IP also is investigated. The research results indicated that the analytical results are the same as the simulation ones.
Physical layer security in DF full-duplex relaying network: performance analysisnooriasukmaningtyas
In this letter, the system performance of the DF full-duplex (FD) relaying
communication network is investigated with physical layer security (PLS). In
this system model, the source (S) and the destination (D) communicate via a
helping relay (R) in the presence of the eavesdropper (E). From the system
model, we derive the closed-form expressions for intercept probability (IP)
and secrecy outage probability (SOP). For verifying the correctness of the
analytical analysis, the Monte Carlo simulation is conducted. In addition, the
influence of the main system parameter on the system performance is
investigated. Finally, the results show that the analytical and the simulation
values agree well with each other.
Performance analysis for power-splitting energy harvesting based two-way full...TELKOMNIKA JOURNAL
Energy harvesting relay network is considered as the promising solution for a wireless
communication network in our time. In this research, we present and demonstrate the system performance
of the energy harvesting based two-way full-duplex relaying network over Nakagami-m fading
environment. Firstly, we propose the analytical expressions of the achievable throughput and outage
probability of the proposed system. In the second step, the effect of various system parameters on
the system performance is presented and investigated. In the final step, the analytical results are also
demonstrated by Monte-Carlo simulation. The numerical results demonstrated and convinced
the analytical and the simulation results are agreed with each other.
An enhanced energy-efficient routing protocol for wireless sensor networkIJECEIAES
The document summarizes an enhanced energy-efficient routing protocol proposed for wireless sensor networks. The proposed protocol selects cluster heads based on current energy levels to avoid nodes with low energy from being selected. It also chooses a root cluster head with high residual energy and short distance to the sink to aggregate and transmit all cluster data. Simulations show the proposed protocol performs better than LEACH in increasing network lifetime by balancing energy consumption and extending stability periods.
Magnetic resonance coupling wireless power transfer for green technologiesawszuher
This document summarizes a research paper on magnetic resonance coupling wireless power transfer. The paper discusses how magnetic resonance coupling can transfer power wirelessly over short to medium distances with high efficiency compared to other wireless power transfer methods. Key findings from simulations presented in the paper show that efficiency is highest when the transmitter and receiver are in resonance at the resonant frequency, and efficiency decreases with lower coupling coefficient values and increased distance between transmitter and receiver coils. The paper concludes that magnetic resonance coupling is well-suited for applications like mobile phone charging but that efficiency reduces with greater transmission distances.
Modelling of a time modulated ultra-wideband communication linkIAEME Publication
This document summarizes the modeling of a time-modulated ultra-wideband (TM UWB) communication link. It describes:
1) How TM UWB signals are generated using time-hopping and pulse-position modulation to transmit data bits.
2) The modeling of an additive white Gaussian noise channel and a correlator receiver to detect signals.
3) The results of simulating a 200-bit transmission, showing UWB pulses are distorted by noise but the original data can be recovered by correlation and integration at the receiver.
Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...IJECEIAES
Conservation of the energy is one of the main design issues in wireless sensor networks. The limited battery power of each sensor node is a challenging task in deploying this type of network. The challenge is crucial in reliable wireless network when implementing efficient error correcting scheme with energy consuming routing protocol. In this work, we investigated the energy performance of LDPC code in multi-hop wireless sensor network. We proposed a model of two base stations to prolong the lifetime and build a reliable and energy-efficient network. Through performed MATLAB simulations, we examine the energy effectiveness of multiple base stations model on reliable wireless sensor network performance in different network dimensions.
All optical network design with even and odd nodeseSAT Journals
Abstract
We have studied the effects of OLTs and OADMs in WDM optical networks. All optical networks have proved to be cost efficient
and power saving in comparison to O-E-O networks. Cost of a network can further be reduced by minimizing the number of IP
router ports and the number of wavelengths required. It has been already studied the number of IP router ports required per node
and number of wavelengths required to carry a fixed amount of traffic, considering the network containing even and odd number
of routing nodes. And finally the result has been compared with other architectures like point to point WDM and hub networks,
finally all-optical networks proved to be most cost efficient in saving number of wavelength requirements and IP router port
requirements. In this paper we have compared all-optical network with itself, by taking even and odd number of nodes. That is we
have compared all-optical network containing even number of nodes with the same all-optical network containing odd number of
nodes. The result what we obtained is to honor same amount of traffic “t”, all-optical network containing odd number of nodes
require lesser number of wavelengths than its previous even number of nodes. We have here varied the number of nodes keeping
the amount of traffic fixed assuming static routing for simplicity of our work. Finally we observed the percentage of change in
wavelength requirements decreases on increasing number of nodes. That is for a large network number of wavelength
requirements are large for even number of nodes than odd number of nodes. But this difference is little more for a small network
size.
Keywords: Wavelength Division Multiplexing (WDM), PPWDM (Point to point WDM), Light paths, traffic, alloptical,
Erlang(E).
A new look on CSI imperfection in downlink NOMA systemsjournalBEEI
- The document analyzes the performance of downlink non-orthogonal multiple access (NOMA) systems under imperfect channel state information (CSI) and Nakagami-m fading.
- It derives closed-form expressions for the outage probability of two users in such NOMA systems considering the joint impact of imperfect CSI and Nakagami-m fading.
- Monte Carlo simulations are conducted to verify the accuracy of the analytical outage probability expressions derived for the two users under the system and channel models considered.
This document presents a MATLAB Simulink model of a QPSK modulated reusable UWB-based optical network. Key aspects include:
1) The model simulates a WDM PON system using QPSK modulation to transmit data over single mode fiber, with and without wavelength reuse from downstream UWB signals.
2) System performance is evaluated by measuring BER and SNR over increasing fiber lengths.
3) Results show that wavelength reuse does not degrade performance, as SNR and BER values closely resemble the non-reuse method over transmission lengths up to 40,000km.
4) The study demonstrates an effective method for wavelength reuse in optical networks to reduce implementation costs without compromising performance.
Review on Massive MIMO (Multiple Input Multiple Output)IRJET Journal
This document provides an overview of massive MIMO (Multiple Input Multiple Output) technology. Massive MIMO involves using a large number (tens to hundreds) of antennas at base stations to serve multiple single-antenna users simultaneously. It can dramatically increase network capacity and spectral efficiency while improving energy efficiency. Challenges include developing accurate channel models, addressing issues like pilot contamination, and designing low-cost hardware to implement massive MIMO on a large scale. Overall, massive MIMO is seen as a promising technology to meet future wireless communication needs but requires further research to realize its full potential benefits.
Lantiq/Intel Contributions to G.fast at Scientific ConferencesLantiq
This document summarizes research on achievable data rates for hybrid copper/fiber networks using G.fast technology. It finds that linear precoding methods like zero-forcing perform well for shorter copper line lengths, while nonlinear methods have advantages for longer lines. The work analyzes performance losses from implementation limitations and proposes optimizing the transmit spectrum to improve achievable rates by incorporating these limitations into the optimization process. Rate-reach curves are generated based on a statistical channel model and constraints from the G.fast standard.
Joint impacts of relaying scheme and wireless power transfer in multiple acce...journalBEEI
This paper considers ergodic capacity of energy harvesting (EH) based cellular networks. Such a network employs non-orthogonal multiple access (NOMA) together with relaying scheme to serve two far users. In this system model, relay is facilitated power splitting (PS) protocol to implement energy harvesting (EH). To examine capacity, expressions of signal to noise ratio (SNR) need be computed to achieve capacity. Power allocation factors are different for two users in such system and hence performance gap happens to distinguish requirements for separated users. It can be confirmed that the proposed paradigm exhibits maximal achievable capacity in some scenarios of setting parameters. To confirm exactness of the analytical expressions and show advantages of the proposed EH-NOMA, simulation results are performed in terms of ergodic capacity.
Design and analysis of microstrip antenna with zig-zag feeder for wireless co...journalBEEI
This document describes the design and analysis of a microstrip antenna with a zig-zag feeder for wireless communication applications. The proposed antenna is designed to have a wide bandwidth of 2-14 GHz. It consists of a zig-zag microstrip feedline connected to a tuning stub printed on one side of a substrate. On the other side of the substrate is a ground plane with zig-zag slots. Parametric analysis was performed to optimize the dimensions for wide bandwidth and acceptable gain between 7.448-5.928 dB. The zig-zag feedline and tuning stub with elliptical slots help improve the impedance matching for wide bandwidth operation suitable for UWB applications. Simulation results for radiation patterns, current distribution, and
This document discusses generating sensor nodes and clustering for energy efficiency in wireless sensor networks (WSNs). It describes how sensor nodes are organized into clusters with a cluster head that communicates with the base station. The presentation proposes an algorithm for selecting the cluster head based on the node's distance to the base station and other nodes, with the goal of increasing network lifetime by optimizing energy consumption. Clustering helps reduce energy usage through data aggregation and limiting transmissions to cluster heads only.
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Snsijwmn
This document summarizes a new Energy-Degree Distance (EDD) Clustering Algorithm for wireless sensor networks. The algorithm aims to minimize energy consumption and balance energy usage among nodes. Key aspects of the EDD algorithm include electing cluster heads based on a node's remaining energy, degree, and distance to the base station. Simulation results show the EDD algorithm outperforms the LEACH algorithm in terms of network lifetime and energy efficiency. Both dynamic and static clustering methods are evaluated, with dynamic clustering showing better performance overall.
Rabid Euclidean direction search algorithm for various adaptive array geometriesjournalBEEI
This document summarizes the Rabid Euclidean direction search (REDS) algorithm for adaptive beamforming in different antenna array geometries. The REDS algorithm is analyzed for linear, circular, and planar array configurations. Simulation results show that the REDS algorithm provides significant improvements over other algorithms, including faster convergence, lower mean square error, better interference reduction, and lower sidelobe levels. Specifically, the REDS algorithm cyclically searches and updates weights along individual Euclidean directions to minimize error, offering computational advantages over algorithms like least mean square and recursive least squares.
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...IRJET Journal
This document discusses optimizing energy efficiency in wireless sensor networks through the use of particle swarm optimization (PSO) and flower pollination optimization (FPO) algorithms. It first provides background on wireless sensor networks and challenges with limited energy. It then proposes using PSO and FPO to determine optimal transmission rate control and power allocation to maximize energy efficiency. Simulation results showed that while PSO converges faster, FPO achieves better stability in optimizing energy efficiency, data transfer rate, transmission power, and power ratio. The document also discusses sources of power consumption and mechanisms to improve energy efficiency in wireless sensor networks, including clustering sensors and data aggregation.
IRJET- Energy Efficiency-Throughput Trade-Offs in 5GIRJET Journal
- The document examines the energy efficiency-throughput tradeoff of Massive MIMO networks and compares the circuit power consumption of different processing schemes.
- It presents a circuit power consumption model for the uplink and downlink of Massive MIMO base stations that accounts for components like transceiver chains, channel estimation, encoding, decoding, backhaul signaling, and signal processing.
- Using the model, it compares the circuit power of processing schemes like M-MMSE, S-MMSE, RZF, ZF, and MR for different antenna and user configurations and finds that schemes like RZF and ZF consume less circuit power than M-MMSE.
This document analyzes and compares the performance of different adaptive beamforming techniques for smart antennas. It describes switched beamforming, which uses fixed beams, and adaptive beamforming techniques that use algorithms like LMS, SMI, RLS, CGA, CMA, and LSCMA to form an adaptive beam. It simulates these algorithms using MATLAB for a uniform linear array and compares their ability to direct the main beam towards the desired user while nulling interference. The LMS, SMI, RLS, CMA and LSCMA algorithms are found to perform well at directing the beam to the desired user, with LMS having good interference rejection and RLS providing the fastest convergence but highest computational cost.
BER Performance of MU-MIMO System using Dirty Paper CodingIJEEE
In this paper Dirty Paper Coding for communication system is implemented. MIMO application that involves devices such as cell phones, pocket PCs require closely spaced antenna, which suffers from mutual coupling among antennas and high spatial correlation for signals. DPC is used for compensating the degradation due to correlation and mutual coupling.
In this paper, we consider one-way relay with energy harvesting system based on power beacon
(PB), in which the relay node harvests transmitted power from the PB station to forward signals to destination.
We also analyse the relay network model with amplify-and-forward (AF) protocol for information cooperation
and Power Splitting-based Relaying (PSR) protocol for power transfer. In particular, the outage probability
and optimal energy harvesting (EH) power splitting fraction of novel scheme in are presented. We obtain
analytical closed-form expression of optimal energy harvesting (EH) power splitting fraction to minimize the
outage probability of system. Using numerical and analytical simulations, the performances of different cases
are presented and discussed.
Physical security with power beacon assisted in half-duplex relaying networks...TELKOMNIKA JOURNAL
In this research, we proposed and investigated physical security with power beacon assisted in half-duplex relaying networks over a Rayleigh fading channel. In this model, the source (S) node communicates with the destination (D) node via the helping of the intermediate relay (R) node. The D and R nodes harvest energy from the power beacon (PB) node in the presence of a passive eavesdropper (E) node. Then we derived the integral form of the system outage probability (OP) and closed form of the intercept probability (IP). The correctness of the analytical of the OP and IP is verified by the Monte Carlo simulation. The influence of the main system parameters on the OP and IP also is investigated. The research results indicated that the analytical results are the same as the simulation ones.
Physical layer security in DF full-duplex relaying network: performance analysisnooriasukmaningtyas
In this letter, the system performance of the DF full-duplex (FD) relaying
communication network is investigated with physical layer security (PLS). In
this system model, the source (S) and the destination (D) communicate via a
helping relay (R) in the presence of the eavesdropper (E). From the system
model, we derive the closed-form expressions for intercept probability (IP)
and secrecy outage probability (SOP). For verifying the correctness of the
analytical analysis, the Monte Carlo simulation is conducted. In addition, the
influence of the main system parameter on the system performance is
investigated. Finally, the results show that the analytical and the simulation
values agree well with each other.
Performance analysis for power-splitting energy harvesting based two-way full...TELKOMNIKA JOURNAL
Energy harvesting relay network is considered as the promising solution for a wireless
communication network in our time. In this research, we present and demonstrate the system performance
of the energy harvesting based two-way full-duplex relaying network over Nakagami-m fading
environment. Firstly, we propose the analytical expressions of the achievable throughput and outage
probability of the proposed system. In the second step, the effect of various system parameters on
the system performance is presented and investigated. In the final step, the analytical results are also
demonstrated by Monte-Carlo simulation. The numerical results demonstrated and convinced
the analytical and the simulation results are agreed with each other.
An enhanced energy-efficient routing protocol for wireless sensor networkIJECEIAES
The document summarizes an enhanced energy-efficient routing protocol proposed for wireless sensor networks. The proposed protocol selects cluster heads based on current energy levels to avoid nodes with low energy from being selected. It also chooses a root cluster head with high residual energy and short distance to the sink to aggregate and transmit all cluster data. Simulations show the proposed protocol performs better than LEACH in increasing network lifetime by balancing energy consumption and extending stability periods.
Magnetic resonance coupling wireless power transfer for green technologiesawszuher
This document summarizes a research paper on magnetic resonance coupling wireless power transfer. The paper discusses how magnetic resonance coupling can transfer power wirelessly over short to medium distances with high efficiency compared to other wireless power transfer methods. Key findings from simulations presented in the paper show that efficiency is highest when the transmitter and receiver are in resonance at the resonant frequency, and efficiency decreases with lower coupling coefficient values and increased distance between transmitter and receiver coils. The paper concludes that magnetic resonance coupling is well-suited for applications like mobile phone charging but that efficiency reduces with greater transmission distances.
Performance Analysis of Differential Beamforming in Decentralized NetworksIJECEIAES
This paper proposes and analyzes a novel differential distributed beamforming strategy for decentralized two-way relay networks. In our strategy, the phases of the received signals at all relays are synchronized without requiring channel feedback or training symbols. Bit error rate (BER) expressions of the proposed strategy are provided for coherent and differential M-PSK modulation. Upper bounds, lower bounds, and simple approximations of the BER are also derived. Based on the theoretical and simulated BER performance, the proposed strategy offers a high system performance and low decoding complexity and delay without requiring channel state information at any transmitting or receiving antenna. Furthermore, the simple approximation of the BER upper bound shows that the proposed strategy enjoys the full diversity gain which is equal to the number of transmitting antennas.
Outage performance users located outside D2D coverage area in downlink cellul...journalBEEI
Device-to-device (D2D) communication has been proposed to employ the proximity between two devices to enhance the overall spectrum utilization of a crowded cellular network. With the help of geometric probability tools, this framework considers the performance of cellular users under spatial separation with the D2D pair is investigated. The measurement results and analytical expression of outage probability show that the proposed frameworks improve the outage performance at a high signal-tonoise ratio (SNR) at the base station. Results also interpret that the distances between nodes in the D2D-assisted network make slight impacts on the performance of the cellular user.
Throughput analysis of non-orthogonal multiple access and orthogonal multipl...IJECEIAES
This study introduces the non-orthogonal multiple access (NOMA) technique into the wireless energy harvesting K-hop relay network to increase throughput. The relays have no dedicated energy source and thus depend on energy harvested by wireless from a power beacon (PB). Recently, NOMA has been promoted as a technology with the potential to enhance connectivity, reduce latency, increase fairness amongst users, and raise spectral effectiveness compared to orthogonal multiple access (OMA) technology. For performance considerations, we derive exact throughput expressions for NOMA and OMA-assisted multi-hop relaying and compare the performance between the two. The obtained results are validated via Monte Carlo simulations.
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...TELKOMNIKA JOURNAL
Nowadays, many research papers focus on the WPCN problem and how to improve its
efficiency. In this research, we propose and investigate Hybrid Decode-Amplify and Forward Protocol
(HDAF) of the Full-Duplex (FD) Energy Harvesting (EH) Relaying Network with the Time Switching (TS)
protocol. In the beginning stage, we present the HDAF mode, which can be work like a
Decode-and-Amplify (DF) or Amplify-and-Forward (AF) modes based on the best of its performance in the
FD EH relaying network. Furthermore, the closed-form expression of the outage probability (OT) is
analyzed and derived in connection with the primary system parameters. Besides, the comparison of
the system performance in the AF, DF, and HDAF is proposed and investigated. Finally, all the results are
convinced by the Monte Carlo simulation for all cases.
Performance enhancement of wireless sensor network by using non-orthogonal mu...nooriasukmaningtyas
In this paper, we investigate a relaying wireless sensor network (WSN) with
the non-orthogonal multiple access (NOMA) and sensor node selection
schemes over rayleigh fading. Precisely, the system consists of two sensor
clusters, a sink node, and an amplify-and-forward (AF) relay. These sensors
applying the NOMA and sensor node selection schemes transmit the sensing
data from the sensor clusters via the relay to the sink. We derived the
expressions of outage probability and throughput for two sensor nodes. We
also provide numerical results to examine the behavior of the system. Finally,
we verify the validity of our analysis by using the monte-carlo simulation.
This document investigates the outage probability (OP) and intercept probability (IP) of user selection protocols in a full-duplex power splitting protocol energy harvesting cooperative network over a Rayleigh fading channel. It proposes a network model where a source communicates with multiple destinations through an energy-constrained relay, while an eavesdropper attempts to intercept communications. The relay uses power splitting to harvest energy from the source signal and decode information to forward. Closed-form expressions are derived for the OP and IP considering different user selection protocols. Simulation results are presented to validate the theoretical analysis. The paper studies how varying system parameters impact network performance in terms of reliability and security.
A REVIEW OF ASYNCHRONOUS AD HOC NETWORK WITH WIRELESS ENERGY HARVESTING AND C...IJSRED
This document discusses an asynchronous cognitive radio network with wireless energy harvesting capabilities. It proposes a model where a primary ad hoc network operates alongside a cognitive secondary network, with the primary nodes connected to a power grid and the secondary nodes capable of harvesting radio frequency (RF) energy. The channel access of both networks is asynchronous and modeled using time-space Poisson point processes. An analytical framework is developed based on stochastic geometry to evaluate the performance of this asynchronous cognitive radio network with wireless energy harvesting secondary nodes.
Secure outage probability of cognitive radio network relying non-orthogonal m...journalBEEI
This paper studies the secondary network relying relay selection to transmit signal from the secondary source (base station) to two destinations. Especially, two destinations are required non-orthogonal multiple access (NOMA) scheme and it benefits to implementation of the Internet of Things (IoT) systems. However, eavesdropper over-hears signal related link from selected relay to destination. This paper measure secure performance via metric, namely secure outage probability (SOP). In particular, signal to noise ratio (SNR) criterion is used to evalute SOP to provide reliable transmission to the terminal node. Main results indicates that the considered scheme provides performance gap among two signals at destination. The exactness of derived expressions is confirmed via numerical simulation.
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...ijp2p
Wireless sensor network are emerging in various fields like environmental monitoring, mining, surveillance
system, medical monitoring. LEACH protocol is one of the predominantly used clustering routing protocols
in wireless sensor networks. In Leach each node has equal chance to become a cluster head which make
the energy dissipated of each node be moderately balanced. We have pioneered an improved algorithm
named as Novel Leach based on Leach protocol. The proposed algorithm shows the significant
improvement in network lifetime .Comparison of proposed algorithm is done with basic leach in terms of
network life time, cluster head selection, energy consumption, and data transmission to base station. The
simulation results shows that proposed algorithm can reduce network energy consumption and prolong
network life commendably. Simulation of our protocol is done with Matlab.
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...ijp2p
Wireless sensor network are emerging in various fields like environmental monitoring, mining, surveillance
system, medical monitoring. LEACH protocol is one of the predominantly used clustering routing protocols
in wireless sensor networks. In Leach each node has equal chance to become a cluster head which make
the energy dissipated of each node be moderately balanced. We have pioneered an improved algorithm
named as Novel Leach based on Leach protocol. The proposed algorithm shows the significant
improvement in network lifetime .Comparison of proposed algorithm is done with basic leach in terms of
network life time, cluster head selection, energy consumption, and data transmission to base station. The
simulation results shows that proposed algorithm can reduce network energy consumption and prolong
network life commendably. Simulation of our protocol is done with Matlab.
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...ijp2p
Wireless sensor network are emerging in various fields like environmental monitoring, mining, surveillance
system, medical monitoring. LEACH protocol is one of the predominantly used clustering routing protocols
in wireless sensor networks. In Leach each node has equal chance to become a cluster head which make
the energy dissipated of each node be moderately balanced. We have pioneered an improved algorithm
named as Novel Leach based on Leach protocol. The proposed algorithm shows the significant
improvement in network lifetime .Comparison of proposed algorithm is done with basic leach in terms of
network life time, cluster head selection, energy consumption, and data transmission to base station. The
simulation results shows that proposed algorithm can reduce network energy consumption and prolong
network life commendably. Simulation of our protocol is done with Matlab.
A low complexity distributed differential scheme based on orthogonal space t...IJECEIAES
The document presents a new low complexity distributed differential scheme for decode-and-forward wireless relay networks. The proposed scheme uses orthogonal space time block coding and does not require channel state information or differential encoding. It achieves high data rates with low decoding complexity at the source, relay, and destination nodes. Computer simulations show the proposed differential technique outperforms reference strategies and enjoys low encoding and decoding complexity while providing full transmission rate.
The document proposes a new system for quantum cryptography network communication using optical tweezers generated via a nonlinear modified add/drop interferometer. Dark solitons and Gaussian pulses are introduced to generate multiple optical potential wells representing secured binary codes. These coded potential wells can be transmitted through different time slots in a time division multiple access system for high-capacity secure data transmission. Narrow output pulses of 9.57 nm and 8 nm were obtained from the drop and through ports, which were then combined and used to generate multiplexed potential well signals with 0.8 nm width and 5 nm frequency spacing for transmitting digital codes to network users via different fiber lengths.
Wireless sensor network are emerging in various fields like environmental monitoring, mining, surveillance
system, medical monitoring. LEACH protocol is one of the predominantly used clustering routing protocols
in wireless sensor networks. In Leach each node has equal chance to become a cluster head which make
the energy dissipated of each node be moderately balanced. We have pioneered an improved algorithm
named as Novel Leach based on Leach protocol. The proposed algorithm shows the significant
improvement in network lifetime .Comparison of proposed algorithm is done with basic leach in terms of
network life time, cluster head selection, energy consumption, and data transmission to base station. The
simulation results shows that proposed algorithm can reduce network energy consumption and prolong
network life commendably. Simulation of our protocol is done with Matlab.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Similar to Investigation on energy harvesting enabled device-to-device networks in presence of co-channel interference (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
This document describes using a snake optimization algorithm to tune the gains of an enhanced proportional-integral controller for congestion avoidance in a TCP/AQM system. The controller aims to maintain a stable and desired queue size without noise or transmission problems. A linearized model of the TCP/AQM system is presented. An enhanced PI controller combining nonlinear gain and original PI gains is proposed. The snake optimization algorithm is then used to tune the parameters of the enhanced PI controller to achieve optimal system performance and response. Simulation results are discussed showing the proposed controller provides a stable and robust behavior for congestion control.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Investigation on energy harvesting enabled device-to-device networks in presence of co-channel interference
1. TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 19, No. 1, February 2021, pp. 27∼35
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v19i1.16138 r 27
Investigation on energy harvesting enabled device-to-device
networks in presence of co-channel interference
Thanh-Luan Nguyen1
, Dinh-Thuan Do2
1
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh City, Vietnam
2
Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang
University, Ho Chi Minh City, Vietnam
Article Info
Article history:
Received Mar 25, 2020
Revised Jul 7, 2020
Accepted Sep 24, 2020
Keywords:
Amplify-and-forward
Co-channel interference
Energy harvesting
Ergodic capacity
Outage capacity
ABSTRACT
Energy harvesting from ambient radio-frequency (RF) sources has been a novel ap-
proach for extending the lifetime of wireless networks. In this paper, a cooperative
device-to-device (D2D) system with the aid of energy-constrained relay is considered.
The relays are assumed to be able to harvest energy from information signal and co-
channel interference (CCI) signals broadcasted by nearby traditional cellular users and
forward the source’s signal to its desired destination (D2D user) utilizing amplify-and-
forward (AF) relaying protocol. Time switching protocol (TSR) and power splitting
protocol (PSR) are proposed to assist energy harvesting and information processing
at the relay. The proposed approaches are applied in a model with three nodes in-
cluding the source (D2D user), the relay and the destination (D2D user), the system
throughput is investigated in terms of the ergodic capacity and the outage capacity,
where the analytical results are obtained approximately. Our numerical results verify
the our derivations, and also points out the impact of CCI on system performance. Fi-
nally, this investigation provide fundamental design guidelines for selecting hardware
of energy harvesting circuits that satisfies the requirements of a practical cooperative
D2D system.
This is an open access article under the CC BY-SA license.
Corresponding Author:
Dinh-Thuan Do
Wireless Communications Research Group
Faculty of Electrical and Electronics Engineering
Ton Duc Thang University, Ho Chi Minh City, Vietnam
Email: dodinhthuan@tdtu.edu.vn
1. INTRODUCTION
Recent advances in energy harvesting technology has indicated that far-field wireless power transfer
can also provide interesting aspects in wireless communication systems [1–7]. Notice that the source sig-
nals carry both energy and information at the same time. Hence, a hypothesis receiver which can process
the information and harvest energy simultaneously is required [8, 9]. However, such device is difficult to im-
plement since the limitation of circuitry. Furthermore, harvesting protocols for information processing and
energy harvesting separately have been mentioned in many scientific papers [10, 11]. In cooperative device-
to-device (D2D) networks, an intermediate relay is deployed between D2D users to enhance the coverage rate
and throughput of communication systems [12, 13].
For both time-switching relaying (TSR) and power-splitting relaying (PSR) protocols, the co-channel
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
2. 28 r ISSN: 1693-6930
interference (CCI) signals act as unnecessary signals, i.e. noises, in information processing phase; on the
contrary, supply energy for forwarding information signal in the energy harvesting phase. More importantly,
energy harvesting (EH) can be implemented in modern networks such as device-to-device (D2D) networks,
small cell networks as many recent works in [14–18]. The authors in [14] examined joint optimization problem
to maximize the energy efficiency evaluation related to D2D pairs together with the amount of harvested power
by cellular user equipment. We need more complex technologies for D2D communications in some way in
cellular bands [15–18]. The impacts of CCI signals are also considered in [19–24]. Motivated by these recent
works, we continue to fill gap in the system performance under considering energy harvesting protocols in D2D
scenario under impact of CCI by traditional cellular users. In this paper, the TSR and PSR receiver architectures
and the corresponding protocols are also adopted. A three-node model of amplify-and-forward (AF) relaying
is proposed for both protocols, where the source node can only communicate with destination node with the
aid of an intermediate energy-constrained relay node.
2. SYSTEM MODEL
Figure 1 illustrates the system model for the underlay D2D in which two devices, namely UEDS and
UEDD, participate in the communication through a controlling base station (BS). Assuming heavily blocked
line-of-sight (LOS) path from UEDS to UEDD, the EH-D2D relay is then deployed to assist the transmission.
In addition, the relay harvests energy from the RF-signal emitted from the UEDS and each interferer UECi,
i = 1, ..., M. Both the source-to-relay link and relay-to-destination link transmission experience quasi-static
independent flat Rayleigh fading with the average gain E{|hS|2
} = ΩS and E{|hD|2
} = ΩD, respectively, in
which E{·} specifies expectation operator. It is previously stated that the CUEs are the cross-mode interferers
and can be treated as CCIs at the relay in the proposed model. The CCIs deteriorate the system performance
but surprisingly aid the energy harvesting process at the relay.
Relay
1
UEC M
UEC
BS
interference
Information link
energy harvesting
S
UED
D
UED
control link
Figure 1. System model of D2D network under impact of the co-channel interferences
3. TIME SWITCHING-BASED RELAYING PROTOCOL
Complying with the TSR-assisted relay architecture, after receiving the RF-signal broadcasted by
UEDS, the relay passes the signal to the energy harvesting receiver for a duration of ξrT block time and then
to the information receiver for that of (1 − ξr) T/2 block time [12]. Accordingly, the relay performs energy
harvesting process and then information process, respectively. Under the presences of the UECs, i.e., the
cellular users, the received signal at node R is modeled as
yR (t) = hSs (t) +
PM
i=1 lisi(t) (t) + ñR[a] (t) , (1)
where s (t) is the information signal with power of PS , E{|s(t)|2
}, hS ∈ C is the complex channel factor
from UEDS to R, si (t) specifies the i-th interference signal with the power of Pi , E{|si(t)|2
}, li ∈ C
TELKOMNIKA Telecommun Comput El Control, Vol. 19, No. 1, February 2021 : 27 – 35
3. TELKOMNIKA Telecommun Comput El Control r 29
denotes complex channel factor from UECi to R, the number of CCIs is denoted by M and ñR[a] (t) is the
corrupted narrow band Gaussian noise observed at the receiving antenna. Subsequently, the received signal
is converted to a basebanded complex signal after the down conversion process, which results the sampled
baseband signal yR (k) given by
yR(k) = hSs(k) +
PM
i=1 lisi(k) + nR[a] (k) + nR[c] (k)
| {z }
,nTSR
R (k)
, (2)
where si(k) and s(k) denote the signals induced after sampling the ith
interfererence signal and the source
signal, respectively, nR[a] (k) is the baseband additive white Gaussian noise (AWGN) at the receiving antenna,
and nR[c] (k) is the sampled AWGN induced after being converted to baseband, si(k) and s(k) have zero means
and variance of NR[a] and NR[c], respectively, and nTSR
R (k) is defined as the total Gaussian noise at node R
introduced from adopting the TSR architecture.
The relay then utilizes ξrT block time to harvest energy from the received signals. Hence, the energy
harvested at the relay is given by
Eh = ξe
PS |hS|
2
+
PM
i=1 Pi |li|
2
ξrT, (3)
where ξe, with 0 ≤ ξe ≤ 1 represents the efficiency of the energy harvester, its value depends on the manu-
facturer. Assuming that the relay fully absorbs the harvested energy to forward the received signal to the other
D2D user, i.e., the UEDD node. Accordingly, the transmit power at the relay can be obtained as
PR = Eh
(1−ξr)T/2 = 2ξrξe
1−ξr
PS |hS|
2
+
PM
i=1 Pi |li|
2
, (4)
As a priority, the relay amplifies the received signal with a gain factor G and then forwards yR(k) to UEDD.
The gain factor G is given by
G =
√
PR
q
PS |hS|
2
+
PM
i=1 Pi |li|
2
+ NTSR
R
, (5)
where NTSR
R
∆
= NR[a]+NR[c] denotes the total Gaussian noise power observed at the relay under TSR protocol.
Secondly, the received signal at UEDD after being sampled, yD (k) is given by
yD(k) = hSs(k)hDG +
PM
i=1 lisi(k) + nTSR
R (k)
hDG + nD(k). (6)
4. POWER SPLITTING-BASED RELAYING PROTOCOL
Let P be the received power at R and β, 0 ≤ β ≤ 1, denote the energy harvesting ratio of the PSR
protocol, thus βP specifies the amount of power inputted into the energy harvester. The remaining power, i.e.,
(1 − β)P, inputs the information transmission to forward the UEDS’s signal to UEDD. Under the presences
of cross-mode CCIs, the received signal observed at the relay antenna is
yR (t) = hSs (t) +
PM
i=1 lisi(t) (t) + ñR[a] (t) . (7)
The sampled baseband signal at the relay node, yR (k), is given by
yR(k) =
p
(1 − β)hSs (k) +
√
1 − β
M
P
i=1
lisi (k) +
p
1 − βnR[a] (k) + nR[c] (k)
| {z }
∆
=nPSR
R (k)
, (8)
in which nPSR
R (k) denotes the total Gaussian noise introduced by the PSR-assisted relay.
At the relay, an amount of received signal, is adopted for energy harvesting. Hence, the energy har-
vested at the node R is
Eh = ξe
PS|hS|2
+
PM
i=1 Pi|li|2
ξrT. (9)
Investigation on energy harvesting enable device-to-device networks... (Thanh-Luan Nguyen)
4. 30 r ISSN: 1693-6930
Assume that the harvested energy is perfectly consumed by the relay. As a result, the transmit power at the
node R is expressed as
PR = EH
T/2 = ξe
PS |hS|
2
+
PM
i=1 Pi |li|
2
β. (10)
Similarly, the relay firstly amplifies the received signal with the gain factor, G, which can be expressed as
G =
√
PR
q
(1 − β) PS |hS|
2
+ (1 − β)
PM
i=1 Pi |li|
2
+ NPSR
R
, (11)
where NPSR
R
∆
= (1 − β) NR[a] + NR[c]. Accordingly, the received signal after the being sampled at the desti-
nation node, yD (k), is given by
yD(k) = hSs(k)hDG +
PM
i=1 lisi(k) + nPSR
R (k)
hDG + nD(k). (12)
5. GENERAL ANALYSIS
We find that the TSR and PSR protocols have similar mechanisms, deriving a general form for the
signal-to-noise-plus-interence ratio (SINR) can be feasible. In order to derive an unified result, we define
nY
R (k) as the total Gaussian noise at the relay with variance of NY
R (k) for the Y ∈ {TSR, PSR} protocol, the
expressions of nTSR
R (k) and nPSR
R (k) are defined in the previous section. Therefore, the unified form of the
achievable end-to-end SINR under the adoption of the protocol Y, denoted by ΨY
gen, can be expressed as
ΨY
gen =
γ1
γINF + 1
γY
g
1 +
NY
R
γ1+γINF
+ NY
R
, (13)
in which γ1 , PS|hS|2
, γINF ,
PM
i=1 Pi|li|2
, γTSR
g , 2ξrξe
1−ξr
|hD|2
ND
and γPSR
g , βξe
|hD|2
ND
. Hereafter, we
define SNR , PSΩS/ND as the average signal-to-noise ratio (SNR).
5.1. Outage probability
In this paper, considering the whole system, an outage event occurs whenever ΨY
gen drops below an
acceptable threshold, γth (dB). Accordingly, the outage probability is defined as
PY
out = Pr ΨY
gen γth
= FΨY
gen
(γth) . (14)
It is not tractable to derive the exact outage probability in closed-form from (14). Hence, to simplify the
calculation, we apply the high SNR approximation. At high SNR, where the UEDS transmits with relatively
high power level, the term ”NY
R/(γ1 + γINF )” in the denominator of (13) can be negligible. As a result, the
approximated SINR at the relay is given by
ΨY
gen ≈
γ1
γINF + 1
γY
g
+ NY
R
. (15)
Therefore, the approximated outage probability, PY
out, in (14) is then rewritten as
FΨY
gen
(γth) ≈
Z ∞
0
Z ∞
0
Pr
γ1 γth
z +
1
y
+ NY
R
fγINF
(y)fγY
g
(z)dydz. (16)
Note that γTSR
g and γPSR
g are random variables having exponential distribution. Subsequently, the probability
density function (PDF) of γY
g is given by
fγY
g
(z) ,
1
γ̄Y
g
exp
−
z
γ̄Y
g
, z 0, (17)
TELKOMNIKA Telecommun Comput El Control, Vol. 19, No. 1, February 2021 : 27 – 35
5. TELKOMNIKA Telecommun Comput El Control r 31
where γ̄TSR
g , 2ξrξe
1−ξr
ΩD
ND
and γ̄PSR
g = ξeβ ΩD
ND
. In addition, the CDF of γ1 is Fγ1
(x) = 1 − exp
n
− x
γ̄1
o
, where
γ̄1 , PSΩS and the PDF of γINF is given by
fγINF
(y) =
v(D)
X
i=1
τi(D)
X
j=1
χi,j(D)
µ−j
hii
(j − 1)!
yj−1
exp
−
y
µhii
, y 0, (18)
in which D = diag (µ1, µ2, ..., µM ) specifies a diagonal matrix with the eigenvalues of µi = Pi
ND
Ωi, υ (D)
denotes the number of distinct diagonal elements, µh1i µh2i ... µhυ(D)i are the distinct diagonal
elements in descending order, τi (D) is the multiplicity of µhii, and χi,j(D) is the (i, j)-th characteristic
coefficient of the matrix D [24]. Substituting (18) and (17) into (16), the approximated PY
out expressed in the
integral-form is given by
PY
out ≈1 −
1
γ̄Y
g
exp
−
NY
Rγth
γ̄1
v(D)
X
i=1
τi(D)
X
j=1
χi,j(D)
(j − 1)!
×
1
µj
hii
Z ∞
0
yj−1
exp
−
γth
γ̄1
+
1
µhii
dy
| {z }
I1
Z ∞
0
exp
−
γth
γ̄1
−
z
γ̄Y
g
dz
| {z }
I2
. (19)
Subsequently, the above integrals (I1 and I2) can be derived in closed-form with the help of [25, (2.3.3.1)] and
[25, (2.3.16.1)] as
I1 =
∞
Z
0
yj−1
exp
−
γth
γ1
+
1
µhii
y
dy = Γ(j)
γth
γ̄1
+
1
µhii
−j
, (20)
I2 =
∞
Z
0
exp
−
γth
γ̄1z
−
z
γ̄Y
g
dz = 2
γthγ̄Y
g
γ̄1
!1/2
K1 2
r
γth
γ̄1γ̄Y
g
!
, (21)
respectively, where Kv (·) denotes the v-th order modified Bessel function of the second kind and Γ(x) specifies
the Gamma function. Hence, the outage probability PY
out can be approximated by using (21), (20) and (19)
which then results the following equation after some algebraic steps
PY
out ≈1 −
s
4γth
γ̄Y
g γ̄1
K1
s
4γth
γ̄Y
g γ̄1
!
exp
−
NY
Rγth
γ̄1
v(D)
X
i=1
τi(D)
X
j=1
χi,j(D)
1 +
µhiiγth
γ̄1
−j
. (22)
When the interfering signals are statistically independent and identically distributed (i.i.d.), i.e., µi = µ, i =
1, 2, ..., M, then υ (D) = 1 and τi (D) = M, the outage probability, PY
out, is then reduced to
PY
out =1 −
s
4γth
γ̄Y
g γ̄1
K1
s
4γth
γ̄Y
g γ̄1
!
exp
−
NY
Rγth
γ̄1
1 +
µγth
γ̄1
−M
. (23)
5.2. Outage capacity and achievable throughput
The outage capacity for the AF cooperative D2D system under consideration is given by
CY
O =
1 − PY
out
log2 (1 + γth) (24)
The achievable throughput is defined in terms of effective transmission block time, which is the block time
utilized for relay-to-destination transmission. According to [24], the achievable throughput of a cooperative
system is given by
τY
O =
(1 − ξr)T/2
T
CTSR
O , Y ≡ TSR
T/2
T
CPSR
O , Y ≡ PSR
=
(1 − ξr)CTSR
O /2 , Y ≡ TSR
CPSR
O /2 , Y ≡ PSR
(25)
Investigation on energy harvesting enable device-to-device networks... (Thanh-Luan Nguyen)
6. 32 r ISSN: 1693-6930
5.3. Ergodic capacity and achievable throughput
In this subsection, the throughput achieved by evaluating the Ergodic capacity in the unit of bits/Hz
is derived as the third important metrics to evaluate the system performance. In the AF-cooperative D2D
communication, using ΨY
gen in (8), the received SINR at the relay, CE is given by
CY
E =E
1
2
log2(1 + ΨY
gen)
=
Z ∞
0
log2(1 + $)fΨY
gen
($)d$, (26)
where fΨY
gen
($) stands for the PDF of the random variable ΨY
gen. Applying the integration by parts for the
integral in (32), the above expression becomes
CY
E =
h
log2(1 + $)(FΨY
gen
($) − 1)
i
7.
8.
9. ∞
0
−
1
ln2
Z ∞
0
1
1 + $
[FΨY
gen
($) − 1]d$ (27)
=
1
ln2
Z ∞
0
1
1 + $
(1 − FΨY
gen
($))d$, (28)
where {f (x)}
b
a
∆
= f (b) − f (a) . Similarly as in 5.2, the throughput at the destination depends only on the
effective transmission time, (1 − ξr) T/2 for TSR protocol and T/2 for PSR protocol, and can be expressed as
τY
E =
(1 − ξr)CTSR
O /2 , Y ≡ TSR
CPSR
O /2 , Y ≡ PSR
(29)
6. NUMERICAL RESULTS
In this section, the simulation results and the approximated analytical results are derived. To evaluate
the effects of the interference on the system throughput we define SIR
∆
= PS ΩS
PM
i=1 PiΩi
as the average signal-to-
interference ratio. The variances are assumed to the identical and kept fixed, that is ND = 1, NR[a] = NR[c] =
1 and the SINR threshold, is set to 8 dB unless stated otherwise. In Figures 2-5, we assume a single interferer
(M = 1). In addition, the energy conversion efficiency is set to 1 (ξe = 1). Importantly, in order to evaluate the
impact of the interference on the throughput, we define kµk = µ
{γINF } as the normalized power distribution,
where µ = µh1i, µh2i, ..., µhMi
.
0 0.2 0.4 0.6 0.8 1
0
0.5
1
1.5
ξ
r
Throughput
(bit/s/Hz)
Y = TSR
Analytical SIR = 10 dB
Analytical SIR = 20 dB
Simulation
τ
E
PSR
τ
O
PSR
Figure 2. Throughput as a function of the energy harvesting ratio with two values of the average SIR, the
average SNR is set to 20 dB
TELKOMNIKA Telecommun Comput El Control, Vol. 19, No. 1, February 2021 : 27 – 35
10. TELKOMNIKA Telecommun Comput El Control r 33
0 0.2 0.4 0.6 0.8 1
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
β
Throughput
(bit/s/Hz)
Y = PSR
Analytical SIR = 10 dB
Analytical SIR = 20 dB
Simulation
τ
E
PSR
τ
O
PSR
Figure 3. Throughput τTSR
E ,τTSR
O , τPSR
E and τPSR
O as a function of the average SNR, in which SIR = 10 dB
Figure 2 shows throughput τTSR
E and τTSR
O versus the energy harvesting ratio ξr for different values
of average SIR where SNR is set to 20 dB. The simulation results of τTSR
E are evaluated, where CY
E and
ΨY
gen are obtained. The solid curves are the corresponding approximated analytical results of τTSR
E which
derived in (33). The dashed curves are the corresponding approximated analytical results of τTSR
O derived. It is
observed in Figure 3 that the throughput increases as the energy harvesting ratio, ξr increases from 0 to some
optimal value but later as ξr continues increasing, the relay wastes more time on energy harvesting rather than
information transmission resulting that the throughput of the system starts dropping down from its maximum
value.
0 5 10 15 20 25 30
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
SNR (dB)
optimal
ξ
r
(Y
=
TSR)
τO
TSR
SIR = 10 dB
τO
TSR
SIR = 20 dB
τE
TSR
SIR = 10 dB
τE
TSR
SIR = 20 dB
Figure 4. Optimal ξr versus the average SNR for
different values of the average SIR
0 5 10 15 20 25 30
0.35
0.4
0.45
0.5
0.55
0.6
0.65
0.7
SNR (dB)
optimal
β
Y = PSR
τ
O
PSR
SIR = 10 dB
τO
PSR
SIR = 20 dB
τE
PSR
SIR = 10 dB
τ
E
PSR
SIR = 20 dB
Figure 5. Optimal β versus the average SNR for
different values of the average SIR
Figure 4 and Figure 5 shows the optimal ξr and optimal β, respectively, the corresponding optimal
throughputs where the average SIR is set to 10 dB are illustrated in Figure 3. It is seen that, in TSR protocol, as
the average SNR increases the optimal ξr decreases. This implies that the system performance can effectively
be enhanced and the time spent for energy harvesting (ξrT ) can also be reduced by increasing the transmit
power of the source, PS. In addition, the optimal ratios to achieve the optimal throughput τTSR
E increases as
the average SIR increases. However, the similar trend does not apply to optimal τTSR
O , in this case, the optimal
ξr does not change as the average SIR increases. The converse happened in PSR protocol, where the optimal
β increases as the average SNR increases. Furthermore, the optimal β to achieve the optimal throughput τPSR
E
decreases as the average SIR increases. This implies that, in PSR protocol, more power is used for energy
harvesting as the average SNR increases and less power can be needed if there is an increasing in the power of
the interference. The impact of CCI power distribution to the system throughput is illustrated in Figure 6 and
Figure 7 for system with TSR and PSR protocol, respectively. The energy harvesting ratio ξr and β are set to
0.2 and 0.8, respectively. Though the power distributions are different, e.g. kµ1k = (1.0, 0, 0, 0) , kµ2k =
Investigation on energy harvesting enable device-to-device networks... (Thanh-Luan Nguyen)
11. 34 r ISSN: 1693-6930
(0.5, 0.5, 0, 0, 0) and kµ1k = (1.0, 0, 0, 0), but the total power of interferers remains the same value. It is
observed that, the achievable throughput decreases as the normalized power distribution are changed from kµ1k
to kµ2k and from kµ2k to kµ3k.
0 5 10 15 20 25 30
0
0.2
0.4
0.6
0.8
1
1.2
1.4
SNR (dB)
Throughput
(bit/s/Hz)
Y = TSR
Ana. µ = (1.0 0 0 0)
Ana. µ = (0.5 0.5 0 0)
Ana. µ = (0.25 0.25 0.25 0.25)
Simulation
τ
E
TSR
τ
O
TSR
Figure 6. Throughput τTSR
E and τTSR
O versus the
average SNR under different CCI power distribution
where the average SIR is set to 10 dB
0 5 10 15 20 25 30
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
1.8
SNR (dB)
Throughput
(bit/s/Hz)
Y = PSR
Ana. µ = (1.0 0 0 0)
Ana. µ = (0.5 0.5 0 0)
Ana. µ = (0.25 0.25 0.25 0.25)
Simulation τ
E
PSR
τ
O
PSR
Figure 7. Throughput τPSR
E and τPSR
O versus the
average SNR under different CCI power distribution
where the average SIR is set to 10 dB
7. CONCLUSION
In this paper, an AF cooperative D2D system was proposed where the EH-assisted relay is affected
by co-channel interferences (CCI) from the CUEs. The energy-constrained relay absorbs the harvested energy
from the received source signal and CCI signals to support the transmission between D2D users. The system
performance can be deteriorated if the power of the CCI signals increases. One can effectively increase the
system throughput by increasing the average SNR, this can be achieved by increasing the transmit power of
D2D users. Lastly, different power distribution can also affect to the system throughput.
REFERENCES
[1] T.-L. Nguyen, D.-T. Do, ”Power Allocation Schemes for Wireless Powered NOMA Systems with Imperfect CSI:
System model and performance analysis, ” International Journal of Communication Systems, vol. 31, no. 15, 2018.
[2] D.-T. Do, et al., “Wireless power transfer enabled NOMA relay systems: two SIC modes and performance evalua-
tion,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 17, no.6, pp. 2697-2703, 2019.
[3] D.-T. Do and C. B. Le, ”Exploiting Outage Performance of Wireless Powered NOMA,” TELKOMNIKA Telecommu-
nication Computing Electronics and Control, vol. 16, no. 5, pp. 1907-1917, 2018.
[4] D.-T. Do, M.-S. Van Nguyen, T. A. Hoang, B. M. Lee, “ Exploiting Joint Base Station Equipped Multiple Antenna
and Full-Duplex D2D Users in Power Domain Division Based Multiple Access Networks,” Sensors,vol. 19, no. 11,
pp. 2475-2494, 2019.
[5] D.-T. Do and C. B. Le, “Application of NOMA in Wireless System with Wireless Power Transfer Scheme: Outage
and Ergodic Capacity Performance Analysis,” Sensors, vol. 18, no. 10, pp. 3501-3517, 2018.
[6] D.-T. Do, M.-S. V. Nguyen, “Outage probability and ergodic capacity analysis of uplink NOMA cellular network
with and without interference from D2D pair,” Physical Communication, vol. 37, 2019.
[7] R. Rajesh, V. Sharma, and P. Viswanath, ”Information capacity of energy harvesting sensor nodes,” Proc. 2011 IEEE
Int. Symp. Inf. Theory, pp. 2363-2367, July 2011.
[8] L. R. Varshney, ”Transporting information and energy simultaneously,” Proc. 2008 IEEE Int. Symp. Inf. Theory, pp.
1612-1616, July 2008.
[9] P. Grover, A. Sahai, ”Shannon meets Tesla: Wireless information and power transfer,” Proc. 2010 IEEE Int. Symp.
Inf. Theory, pp. 2363-2367, July 2010.
[10] R. Zhang and C. K. Ho, ”MIMO broadcasting for simultaneous wireless information and power transfer,” IEEE Trans.
Wirel. Commun., vol. 12, no. 5, pp. 1989-2001, May 2013.
[11] B. Medepally and N. B. Mehta, ”Voluntary energy harvesting relays and selection in cooperative wireless networks,”
IEEE Trans. Wirel. Commun., vol. 9, no. 11, pp. 3543-3553, November 2010.
[12] A. A. Nasir, X. Zhou, S. Durrani, and R. A. Kennedy, ”Relaying protocols for wireless energy harvesting and infor-
mation processing,” IEEE Trans. Wirel. Commun., vol. 7, no. 12, pp. 3622-3636, Nov. 2013.
TELKOMNIKA Telecommun Comput El Control, Vol. 19, No. 1, February 2021 : 27 – 35
12. TELKOMNIKA Telecommun Comput El Control r 35
[13] D. Yang, ”Wireless Information and Power Transfer: Optimal power control in one-way and two-way relay system,”
Wireless Personal Commun., vol. 84, no. 1, pp. 1-14, June 2015.
[14] Z. Zhou, C. Gao, C. Xu, T. Chen, D. Zhang and S. Mumtaz, ”Energy-Efficient Stable Matching for Resource Alloca-
tion in Energy Harvesting-Based Device-to-Device Communications,” IEEE Access, vol. 5, pp. 15184-15196, May
2017.
[15] S. Lee, R. Zhang, and K. Huang, ”Opportunistic wireless energy harvesting in cognitive radio networks,” IEEE Trans.
Wireless Commun., vol. 12, no. 9, pp. 4788-4799, September 2013.
[16] S. Gupta, R. Zhang and L. Hanzo, ”Energy Harvesting Aided Device-to-Device Communication Underlaying the
Cellular Downlink,” IEEE Access, vol. 5, pp. 7405-7413, 2017.
[17] L. Jiang et al., ”Social-aware energy harvesting device-to-device communications in 5G networks,” IEEE Wirel.
Commun., vol. 23, no. 4, pp. 20-27, 2016.
[18] M. L. Ku, J. W. Lai, ”Joint Beamforming and Resource Allocation for Wireless-Powered Device-to-Device Commu-
nications in Cellular Networks,” IEEE Trans. Wirel. Commun., vol. 16, no. 11, pp. 7290-7304, 2017.
[19] D. W. K. Ng, R. Schober, Spectral efficient optimization in OFDM systems with wireless information and power
transfer, Proc. 21st Eur. Signal Process. Conf., pp. 1-5, September 2013.
[20] G. Yang, C. K. Ho, and Y. L. Guan, Dynamic resource allocation for multiple-antenna wireless power transfer, IEEE
Trans. Signal Process., vol. 62, no. 14, pp. 3565-3577, Jul. 2014
[21] D.-T. Do, H. S. Nguyen, ”A Tractable Approach to Analyze the Energy-Aware Two-way Relaying Networks in
Presence of Co-channel Interference,” EURASIP Journal on Wireless Communications and Networking, vol. 2016,
no. 271, 2016.
[22] T.-L. Nguyen, D.-T. Do, ”A new look at AF two-way relaying networks: energy harvesting architecture and impact
of co-channel interference”, Annals of Telecommunications, vol. 72, no. 11, pp. 669-678, 2017.
[23] J. A. Hussein, S. Boussakta and S. S. Ikki, ”Performance Study of a UCRN Over Nakagami- m Fading Channels
in the Presence of CCI,” IEEE Trans. on Cognitive Communications and Networking, vol. 3, no. 4, pp. 752-765,
December 2017.
[24] Y. Gu and S. Aissa, ”Interference aided energy harvesting in decode-and forward relaying systems,” in Proc. IEEE
Int. Conf. Commun., pp. 5378-5382, Jun. 2014.
[25] A. P. Prudnikov, Y. A. Brychkov, and O. I. Marichev, Integrals and Series, vols. 1-2. New York, Gordon and Breach
Science Publishers, 1986.
Investigation on energy harvesting enable device-to-device networks... (Thanh-Luan Nguyen)