5,333 research outputs found

    Performance analysis for power-splitting energy harvesting based two-way full-duplex relaying network over nakagami-m fading channel

    Get PDF
    Energy harvesting relay network is considered as the promising solution for a wireless communication network in our time. In this research, we present and demonstrate the system performance of the energy harvesting based two-way full-duplex relaying network over Nakagami-m fading environment. Firstly, we propose the analytical expressions of the achievable throughput and outage probability of the proposed system. In the second step, the effect of various system parameters on the system performance is presented and investigated. In the final step, the analytical results are also demonstrated by Monte-Carlo simulation. The numerical results demonstrated and convinced the analytical and the simulation results are agreed with each other

    Outage probability analysis of EH relay-assisted non-orthogonal multiple access (NOMA) systems over Block Rayleigh Fading Channel

    Get PDF
    Non-orthogonal multiple access (NOMA) has been identified as a promising multiple access technique for the fifth generation (5G) mobile networks due to its superior spectral efficiency. In this paper, we propose and investigate a Non-Orthogonal Multiple Access (NOMA) of energy harvesting (EH) relay assisted system over Block Rayleigh Fading Channel. In order to evaluate the performance of the proposed system, the integral expression of the outage probability is analyzed and derived. Numerical results confirm that our derived analytical results match well with the Monte Carlo simulations in connection with all possible system parameter

    Half-duplex power beacon-assisted energy harvesting relaying networks: system performance analysis

    Get PDF
    In this work, the half-duplex (HF) power beacon-assisted (PB) energy harvesting (EH) relaying network, which consists of a source (S), Relay (R), destination (D) and a power beacon (PB) are introduced and investigated. Firstly, the analytical expressions of the system performance in term of outage probability (OP) and the system throughput (ST) are analyzed and derived in both amplify-and-forward (AF) and decode-and-forward (DF) modes. After that, we verify the correctness of the analytical analysis by using Monte-Carlo simulation in connection with the primary system parameters. From the numerical results, we can see that all the analytical and the simulation results are matched well with each other

    Market based approaches for food safety and animal health interventions in smallholder pig systems: the case of Vietnam

    Get PDF
    Food safety and animal health concerns place rising burdens on smallholder pig production in Viet Nam, both in terms of negatively affecting livelihoods and profitability as well as reducing consumer confidence in pork. While reducing the incidence of pig disease and improving the safety of pork products are potentially important public goods, it is critical to take into account the tradeoffs between improved animal health and food safety outcomes and their associated costs

    Countering Eavesdroppers with Meta-learning-based Cooperative Ambient Backscatter Communications

    Full text link
    This article introduces a novel lightweight framework using ambient backscattering communications to counter eavesdroppers. In particular, our framework divides an original message into two parts: (i) the active-transmit message transmitted by the transmitter using conventional RF signals and (ii) the backscatter message transmitted by an ambient backscatter tag that backscatters upon the active signals emitted by the transmitter. Notably, the backscatter tag does not generate its own signal, making it difficult for an eavesdropper to detect the backscattered signals unless they have prior knowledge of the system. Here, we assume that without decoding/knowing the backscatter message, the eavesdropper is unable to decode the original message. Even in scenarios where the eavesdropper can capture both messages, reconstructing the original message is a complex task without understanding the intricacies of the message-splitting mechanism. A challenge in our proposed framework is to effectively decode the backscattered signals at the receiver, often accomplished using the maximum likelihood (MLK) approach. However, such a method may require a complex mathematical model together with perfect channel state information (CSI). To address this issue, we develop a novel deep meta-learning-based signal detector that can not only effectively decode the weak backscattered signals without requiring perfect CSI but also quickly adapt to a new wireless environment with very little knowledge. Simulation results show that our proposed learning approach, without requiring perfect CSI and complex mathematical model, can achieve a bit error ratio close to that of the MLK-based approach. They also clearly show the efficiency of the proposed approach in dealing with eavesdropping attacks and the lack of training data for deep learning models in practical scenarios
    corecore