EVM-Aware Relay Path Decision with Hierarchical Modulation for Reliable Data Transmission in Cooperative Relay Networks DOI Creative Commons

Uma Devi,

R. K. Mugelan

Results in Engineering, Journal Year: 2024, Volume and Issue: unknown, P. 103468 - 103468

Published: Nov. 1, 2024

Language: Английский

Reinforcement Learning-Based Resource Allocation Scheme of NR-V2X Sidelink for Joint Communication and Sensing DOI Creative Commons
Zihan Li, Ping Wang, Yamin Shen

et al.

Sensors, Journal Year: 2025, Volume and Issue: 25(2), P. 302 - 302

Published: Jan. 7, 2025

Joint communication and sensing (JCS) is becoming an important trend in 6G, owing to its efficient utilization of spectrums hardware resources. Utilizing echoes the same signal can achieve object location function, addition V2X function. There application potential for JCS systems fields ADAS unmanned autos. Currently, NR-V2X sidelink has been standardized by 3GPP support low-latency high-reliability direct communication. In order combine benefits both JCS, it promising extend existing toward JCS. However, conflicting performance requirements arise between radar accuracy reliability with limited spectrum. overcome challenges distributed resource allocation a full-duplex, this paper proposed novel consecutive-collision mitigation semi-persistent scheduling (CCM-SPS) scheme, including collision detection Q-learning training stages suppress probabilities. Theoretical analyses on Cramér-Rao Lower Bounds (CRLBs) have made Key metrics such as CRLB, PRR UD evaluated. Simulation results show superior CCM-SPS compared similar solutions, prospects.

Language: Английский

Citations

1

6G Goal-Oriented Communications: How to Coexist with Legacy Systems? DOI Creative Commons
Mattia Merluzzi, Miltiadis C. Filippou,

Leonardo Gomes Baltar

et al.

Telecom, Journal Year: 2024, Volume and Issue: 5(1), P. 65 - 97

Published: Jan. 24, 2024

6G will connect heterogeneous intelligent agents to make them natively operate complex cooperative tasks. When connecting intelligence, two main research questions arise identify how artificial intelligence and machine learning models behave depending on (i) their input data quality, affected by errors induced interference additive noise during wireless communication; (ii) contextual effectiveness resilience interpret exploit the meaning behind data. Both are within realm of semantic goal-oriented communications. With this paper, we investigate effectively share communication spectrum resources between a legacy system (i.e., data-oriented) new edge one. Specifically, address scenario an enhanced Mobile Broadband (eMBB) service, i.e., user uploading video stream radio access point, interfering with inference system, in which uploads images Edge Host that runs classification task. Our objective is achieve, through cooperation, highest eMBB service rate, subject targeted goal namely probability confident time. We first formalize general definition context This includes effectiveness, achievability or achieving goal), as well cost network resource consumption needed achieve target effectiveness). argue show, numerical evaluations, reliability not straightforwardly linked. Then, after performance evaluation aiming clarify difference long-term optimization problem formulated solved via Lyapunov stochastic tools guarantee desired performance. Finally, our results assess advantages proposed superiority strategy against baseline 5G-compliant approaches, under both stationary non-stationary (and computation) environments.

Language: Английский

Citations

4

Secure 5G Coordinating Spectrum Sharing System With Cooperation Transmitter and Receiver Pairs DOI

Ayat M. Alrjoob,

Ahmad Ababnah,

Mamoun F. Al‐Mistarihi

et al.

Transactions on Emerging Telecommunications Technologies, Journal Year: 2025, Volume and Issue: 36(3)

Published: March 1, 2025

ABSTRACT In this paper, we propose a 6‐node system consisting of two transmitter‐receiver pairs sharing the same spectrum, an eavesdropper, and relay, all operating in half‐duplex. The eavesdropper is mainly interested communication between one pairs, which call primary. Communication along with second pair called secondary, performed hops/time slots aid relay. main idea our study to investigate secrecy performance primary when jamming by secondary relay‐assisted path. particular, first time slot, destination acts as jammer relative injecting artificial noise known pair. During transmitter while relay forwards data destination. effect, allows for cooperation among nodes both transmitting reducing eavesdropper's ability listen on link communication. For proposed protocol, derive closed‐form expressions intercept probability. We also obtain expression outage probability link. Moreover, effect transmit power allocation probabilities different links. Theoretical simulation results are given prove that protocol can provide better security acquire acceptable

Language: Английский

Citations

0

The Analysis of Device-to-Device (D2D) Communication System Operating in 5G Underlaying Cellular Networks on Multiple Bands over Nakagami-m Fading Channels DOI

Razan F. Shatnawi,

Mahmoud A. Khodeir, Mamoun F. Al‐Mistarihi

et al.

SN Computer Science, Journal Year: 2025, Volume and Issue: 6(5)

Published: May 2, 2025

Language: Английский

Citations

0

Age of Information in NOMA-IoT Networks: A Temporal Queuing Model Perspective DOI Creative Commons
Lei Liu,

Kangjing Li,

Pengfei Du

et al.

Mathematics, Journal Year: 2024, Volume and Issue: 12(10), P. 1440 - 1440

Published: May 7, 2024

The Internet of Things (IoT) with non-orthogonal multiple access (NOMA) has been anticipated to offer diverse real-time applications, wherein the crux is guarantee age information (AoI) for dynamic traffic. However, traffic temporal variation provokes interdependence between queue status and interference, in which context AoI performance remains be further explored. In this paper, an analytical framework established characterize NOMA-IoT networks random Bernoulli deterministic periodic arrivals. Particularly, a numerical algorithm devised obtain service rate, tractable expressions violation probability average under both first-come first-served (FCFS) preemptive last-come (LCFS-PR) disciplines are derived. Simulations conducted validate proposed analysis. results unveil that LCFS-PR conduces better than FCFS, yet gain diverges each device different arrival configurations. addition, result shows sporadic arrival, pattern outperforms pattern, whereas advantage gradually diminishes more frequent packet arrival.

Language: Английский

Citations

1

Physical-layer security for primary users in 5G underlay cognitive radio system via artificial-noise-aided by secondary users DOI

Ayat M. Alrjoob,

Ahmad Ababnah,

Mamoun F. Al‐Mistarihi

et al.

International Journal of Computers and Applications, Journal Year: 2024, Volume and Issue: 46(9), P. 702 - 714

Published: July 24, 2024

The advent of the Internet Things (IoT) has revolutionized connectivity by interconnecting a vast array devices, underscoring critical need for robust data security, particularly at Physical Layer Security (PLS). Ensuring confidentiality and integrity during wireless communications poses primary challenge in IoT environments. Additionally, within constrained frequency bands available, Cognitive Radio Networks (CRNs) emerged as an urgent necessity to optimize spectrum utilization. This technology enables intelligent management radio frequencies, enhancing network efficiency adaptability dynamic environmental changes. In this research, we focus on examining PLS channel underlying CRNs. Our proposed model involves source-destination pair secondary transmitter-receiver sharing same band simultaneously. presence common eavesdropper, concern lies securing link communication. user (SU) acts cooperative jamming, strategically allocating portion its transmission power transmit artificial interference, thus confusing eavesdropper protecting user's (PU) SU is regulated maximum interference tolerated network's receiver. To evaluate effectiveness our protocol, develop closed-form mathematical expressions intercept probability (Pint) outage (OP) along communication link. derive OP network. Furthermore, investigate impact allocation probabilities across various links. Through both simulation theoretical analysis, protocol aims enhance protection while ensuring appropriate OP, thereby contributing advancements security management.

Language: Английский

Citations

1

Energy efficient multi-user task offloading through active RIS with hybrid TDMA-NOMA transmission DOI
Baoshan Lu, Junli Fang, Junxiu Liu

et al.

Journal of Network and Computer Applications, Journal Year: 2024, Volume and Issue: 232, P. 104005 - 104005

Published: Aug. 23, 2024

Language: Английский

Citations

1

Location-Based Relay Selection in Full-Duplex Random Relay Networks DOI Creative Commons

Jonghyun Bang,

Taehyoung Kim

Applied Sciences, Journal Year: 2024, Volume and Issue: 14(22), P. 10626 - 10626

Published: Nov. 18, 2024

Full-duplex relay (FDR) has attracted considerable interest in enhancing the performance of networks by utilizing resources more efficiently. In this paper, we propose a framework for full-duplex random (FDRRNs), where nodes equipped with (FD) capability are randomly distributed within finite two-dimensional region. We first derive outage probability an FDRRN and then identify potential location that minimizes probability. Furthermore, introduce low-complexity selection algorithm selects node nearest to location. Finally, simulation results show proposed achieves comparable max-min algorithm.

Language: Английский

Citations

1

Channel Model for CM-3 Scenario Over Generalized Distribution Under Various Window Functions DOI Creative Commons
Shekhar Singh, S. Pratap Singh,

M Lakshmanan

et al.

Deleted Journal, Journal Year: 2024, Volume and Issue: unknown

Published: Jan. 22, 2024

In terms of fundamental research and technology development level, Wireless Body Area Network (WBAN) is a well-established paradigm wireless system. However, like any system, channel modeling WBAN one the most challenging eras. Also, literature suggests Channel Model-3, termed as CM-3 scenario based on positioning Nano antenna, useful deployment scenarios WBAN. Further, arrival time number arrivals, which plays an important role in WBAN, are modeled using Poisson distribution. distribution variance mean equal probability success kept fixed. Hence, versatility model limited due to parameters. On other hand, Negative Binomial (NB) with extra parameters more general Therefore, this manuscript employs present under scenario. addition, effects different windowing techniques, such Bartlett Gaussian window, analyzed both, distributions.

Language: Английский

Citations

0

Performance Evaluation of Multi-hop Multi-branch AF Relaying Cooperative Diversity Network DOI

Arwa Sh. Aqel,

Mamoun F. Al‐Mistarihi

Lecture notes in networks and systems, Journal Year: 2024, Volume and Issue: unknown, P. 479 - 493

Published: Jan. 1, 2024

Language: Английский

Citations

0