335 research outputs found

    Ieee access special section editorial: Cloud and big data-based next-generation cognitive radio networks

    Get PDF
    In cognitive radio networks (CRN), secondary users (SUs) are required to detect the presence of the licensed users, known as primary users (PUs), and to find spectrum holes for opportunistic spectrum access without causing harmful interference to PUs. However, due to complicated data processing, non-real-Time information exchange and limited memory, SUs often suffer from imperfect sensing and unreliable spectrum access. Cloud computing can solve this problem by allowing the data to be stored and processed in a shared environment. Furthermore, the information from a massive number of SUs allows for more comprehensive information exchanges to assist the

    Energy-Efficient NOMA Enabled Heterogeneous Cloud Radio Access Networks

    Get PDF
    Heterogeneous cloud radio access networks (H-CRANs) are envisioned to be promising in the fifth generation (5G) wireless networks. H-CRANs enable users to enjoy diverse services with high energy efficiency, high spectral efficiency, and low-cost operation, which are achieved by using cloud computing and virtualization techniques. However, H-CRANs face many technical challenges due to massive user connectivity, increasingly severe spectrum scarcity and energy-constrained devices. These challenges may significantly decrease the quality of service of users if not properly tackled. Non-orthogonal multiple access (NOMA) schemes exploit non-orthogonal resources to provide services for multiple users and are receiving increasing attention for their potential of improving spectral and energy efficiency in 5G networks. In this article a framework for energy-efficient NOMA H-CRANs is presented. The enabling technologies for NOMA H-CRANs are surveyed. Challenges to implement these technologies and open issues are discussed. This article also presents the performance evaluation on energy efficiency of H-CRANs with NOMA.Comment: This work has been accepted by IEEE Network. Pages 18, Figure

    Wireless powered D2D communications underlying cellular networks: design and performance of the extended coverage

    Get PDF
    Because of the short battery life of user equipments (UEs), and the requirements for better quality of service have been more demanding, energy efficiency (EE) has emerged to be important in device-to-device (D2D) communications. In this paper, we consider a scenario, in which D2D UEs in a half-duplex decode-and-forward cognitive D2D communication underlying a traditional cellular network harvest energy and communicate with each other by using the spectrum allocated by the base station (BS). In order to develop a practical design, we achieve the optimal time switching (TS) ratio for energy harvesting. Besides that, we derive closed-form expressions for outage probability, sum-bit error rate, average EE and instantaneous rate by considering the scenario when installing the BS near UEs or far from the UEs. Two communication types are enabled by TS-based protocol. Our numerical and simulation results prove that the data rate of the D2D communication can be significantly enhanced.Web of Science58439939

    Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers

    Get PDF
    In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter-receiver pair in the presence of randomly distributed eavesdroppers under an interference constraint set by the primary user. For different channel knowledge assumptions at the transmitter, we design four transmission protocols to achieve the secure transmission in the CR network. We give a comprehensive performance analysis for each protocol in terms of transmission delay, security, reliability, and the overall secrecy throughput. Furthermore, we determine the optimal design parameter for each transmission protocol by solving the optimization problem of maximizing the secrecy throughput subject to both security and reliability constraints. Numerical results illustrate the performance comparison between different transmission protocols.ARC Discovery Projects Grant DP15010390

    IEEE Access Special Section Editorial: Wirelessly Powered Networks, and Technologies

    Get PDF
    Wireless Power Transfer (WPT) is, by definition, a process that occurs in any system where electrical energy is transmitted from a power source to a load without the connection of electrical conductors. WPT is the driving technology that will enable the next stage in the current consumer electronics revolution, including battery-less sensors, passive RF identification (RFID), passive wireless sensors, the Internet of Things and 5G, and machine-to-machine solutions. WPT-enabled devices can be powered by harvesting energy from the surroundings, including electromagnetic (EM) energy, leading to a new communication networks paradigm, the Wirelessly Powered Networks
    corecore