
Results in Engineering, Journal Year: 2024, Volume and Issue: unknown, P. 103468 - 103468
Published: Nov. 1, 2024
Language: Английский
Results in Engineering, Journal Year: 2024, Volume and Issue: unknown, P. 103468 - 103468
Published: Nov. 1, 2024
Language: Английский
Sensors, Journal Year: 2025, Volume and Issue: 25(2), P. 302 - 302
Published: Jan. 7, 2025
Joint communication and sensing (JCS) is becoming an important trend in 6G, owing to its efficient utilization of spectrums hardware resources. Utilizing echoes the same signal can achieve object location function, addition V2X function. There application potential for JCS systems fields ADAS unmanned autos. Currently, NR-V2X sidelink has been standardized by 3GPP support low-latency high-reliability direct communication. In order combine benefits both JCS, it promising extend existing toward JCS. However, conflicting performance requirements arise between radar accuracy reliability with limited spectrum. overcome challenges distributed resource allocation a full-duplex, this paper proposed novel consecutive-collision mitigation semi-persistent scheduling (CCM-SPS) scheme, including collision detection Q-learning training stages suppress probabilities. Theoretical analyses on Cramér-Rao Lower Bounds (CRLBs) have made Key metrics such as CRLB, PRR UD evaluated. Simulation results show superior CCM-SPS compared similar solutions, prospects.
Language: Английский
Citations
1Telecom, Journal Year: 2024, Volume and Issue: 5(1), P. 65 - 97
Published: Jan. 24, 2024
6G will connect heterogeneous intelligent agents to make them natively operate complex cooperative tasks. When connecting intelligence, two main research questions arise identify how artificial intelligence and machine learning models behave depending on (i) their input data quality, affected by errors induced interference additive noise during wireless communication; (ii) contextual effectiveness resilience interpret exploit the meaning behind data. Both are within realm of semantic goal-oriented communications. With this paper, we investigate effectively share communication spectrum resources between a legacy system (i.e., data-oriented) new edge one. Specifically, address scenario an enhanced Mobile Broadband (eMBB) service, i.e., user uploading video stream radio access point, interfering with inference system, in which uploads images Edge Host that runs classification task. Our objective is achieve, through cooperation, highest eMBB service rate, subject targeted goal namely probability confident time. We first formalize general definition context This includes effectiveness, achievability or achieving goal), as well cost network resource consumption needed achieve target effectiveness). argue show, numerical evaluations, reliability not straightforwardly linked. Then, after performance evaluation aiming clarify difference long-term optimization problem formulated solved via Lyapunov stochastic tools guarantee desired performance. Finally, our results assess advantages proposed superiority strategy against baseline 5G-compliant approaches, under both stationary non-stationary (and computation) environments.
Language: Английский
Citations
4Transactions on Emerging Telecommunications Technologies, Journal Year: 2025, Volume and Issue: 36(3)
Published: March 1, 2025
ABSTRACT In this paper, we propose a 6‐node system consisting of two transmitter‐receiver pairs sharing the same spectrum, an eavesdropper, and relay, all operating in half‐duplex. The eavesdropper is mainly interested communication between one pairs, which call primary. Communication along with second pair called secondary, performed hops/time slots aid relay. main idea our study to investigate secrecy performance primary when jamming by secondary relay‐assisted path. particular, first time slot, destination acts as jammer relative injecting artificial noise known pair. During transmitter while relay forwards data destination. effect, allows for cooperation among nodes both transmitting reducing eavesdropper's ability listen on link communication. For proposed protocol, derive closed‐form expressions intercept probability. We also obtain expression outage probability link. Moreover, effect transmit power allocation probabilities different links. Theoretical simulation results are given prove that protocol can provide better security acquire acceptable
Language: Английский
Citations
0SN Computer Science, Journal Year: 2025, Volume and Issue: 6(5)
Published: May 2, 2025
Language: Английский
Citations
0Mathematics, Journal Year: 2024, Volume and Issue: 12(10), P. 1440 - 1440
Published: May 7, 2024
The Internet of Things (IoT) with non-orthogonal multiple access (NOMA) has been anticipated to offer diverse real-time applications, wherein the crux is guarantee age information (AoI) for dynamic traffic. However, traffic temporal variation provokes interdependence between queue status and interference, in which context AoI performance remains be further explored. In this paper, an analytical framework established characterize NOMA-IoT networks random Bernoulli deterministic periodic arrivals. Particularly, a numerical algorithm devised obtain service rate, tractable expressions violation probability average under both first-come first-served (FCFS) preemptive last-come (LCFS-PR) disciplines are derived. Simulations conducted validate proposed analysis. results unveil that LCFS-PR conduces better than FCFS, yet gain diverges each device different arrival configurations. addition, result shows sporadic arrival, pattern outperforms pattern, whereas advantage gradually diminishes more frequent packet arrival.
Language: Английский
Citations
1International Journal of Computers and Applications, Journal Year: 2024, Volume and Issue: 46(9), P. 702 - 714
Published: July 24, 2024
The advent of the Internet Things (IoT) has revolutionized connectivity by interconnecting a vast array devices, underscoring critical need for robust data security, particularly at Physical Layer Security (PLS). Ensuring confidentiality and integrity during wireless communications poses primary challenge in IoT environments. Additionally, within constrained frequency bands available, Cognitive Radio Networks (CRNs) emerged as an urgent necessity to optimize spectrum utilization. This technology enables intelligent management radio frequencies, enhancing network efficiency adaptability dynamic environmental changes. In this research, we focus on examining PLS channel underlying CRNs. Our proposed model involves source-destination pair secondary transmitter-receiver sharing same band simultaneously. presence common eavesdropper, concern lies securing link communication. user (SU) acts cooperative jamming, strategically allocating portion its transmission power transmit artificial interference, thus confusing eavesdropper protecting user's (PU) SU is regulated maximum interference tolerated network's receiver. To evaluate effectiveness our protocol, develop closed-form mathematical expressions intercept probability (Pint) outage (OP) along communication link. derive OP network. Furthermore, investigate impact allocation probabilities across various links. Through both simulation theoretical analysis, protocol aims enhance protection while ensuring appropriate OP, thereby contributing advancements security management.
Language: Английский
Citations
1Journal of Network and Computer Applications, Journal Year: 2024, Volume and Issue: 232, P. 104005 - 104005
Published: Aug. 23, 2024
Language: Английский
Citations
1Applied Sciences, Journal Year: 2024, Volume and Issue: 14(22), P. 10626 - 10626
Published: Nov. 18, 2024
Full-duplex relay (FDR) has attracted considerable interest in enhancing the performance of networks by utilizing resources more efficiently. In this paper, we propose a framework for full-duplex random (FDRRNs), where nodes equipped with (FD) capability are randomly distributed within finite two-dimensional region. We first derive outage probability an FDRRN and then identify potential location that minimizes probability. Furthermore, introduce low-complexity selection algorithm selects node nearest to location. Finally, simulation results show proposed achieves comparable max-min algorithm.
Language: Английский
Citations
1Deleted Journal, Journal Year: 2024, Volume and Issue: unknown
Published: Jan. 22, 2024
In terms of fundamental research and technology development level, Wireless Body Area Network (WBAN) is a well-established paradigm wireless system. However, like any system, channel modeling WBAN one the most challenging eras. Also, literature suggests Channel Model-3, termed as CM-3 scenario based on positioning Nano antenna, useful deployment scenarios WBAN. Further, arrival time number arrivals, which plays an important role in WBAN, are modeled using Poisson distribution. distribution variance mean equal probability success kept fixed. Hence, versatility model limited due to parameters. On other hand, Negative Binomial (NB) with extra parameters more general Therefore, this manuscript employs present under scenario. addition, effects different windowing techniques, such Bartlett Gaussian window, analyzed both, distributions.
Language: Английский
Citations
0Lecture notes in networks and systems, Journal Year: 2024, Volume and Issue: unknown, P. 479 - 493
Published: Jan. 1, 2024
Language: Английский
Citations
0