264 research outputs found

    Joint bi-static radar and communications designs for intelligent transportation

    Get PDF
    The cooperation of radar and communications becomes important in vehicular environments due to the demand for radar-assisted communications or communications-assisted radar. In this paper, the tradeoff between bi-static radar and communications in a joint radar-communications setting is studied. We propose three schemes by using time division, superposition or their mixture. For each scheme, three optimization problems are formulated to maximize either the probability of detection for radar subject to a minimum communications rate, the communications rate subject to a minimum probability of detection for radar, or a combined measure of tradeoff. Specifically, given a fixed amount of total time or power for both communications and radar, the optimal power allocation and/or time allocation between radar and communications are derived. Numerical results show that the superposition scheme outperforms the time division scheme and the mixture scheme with considerable performance gains. They also show that the surveillance channel in radar and the communications channel are more important than the direct channel in radar

    Cell free satellite-UAV networks for 6G wide-area Internet of Things

    Get PDF
    In fifth generation (5G) and beyond Internet of Things (IoT), it becomes increasingly important to serve a massive number of IoT devices outside the coverage of terrestrial cellular networks. Due to their own limitations, unmanned aerial vehicles (UAVs) and satellites need to coordinate with each other in the coverage holes of 5G, leading to a cognitive satellite-UAV network (CSUN). In this paper, we investigate multi-domain resource allocation for CSUNs consisting of a satellite and a swarm of UAVs, so as to improve the efficiency of massive access in wide areas. Particularly, the cell-free on-demand coverage is established to overcome the cost-ineffectiveness of conventional cellular architecture. Opportunistic spectrum sharing is also implemented to cope with the spectrum scarcity problem. To this end, a process-oriented optimization framework is proposed for jointly allocating subchannels, transmit power and hovering times, which considers the whole flight process of UAVs and uses only the slowly-varying large-scale channel state information (CSI). Under the on-board energy constraints of UAVs and interference temperature constraints from UAV swarm to satellite users, we present iterative multi-domain resource allocation algorithms to improve network efficiency with guaranteed user fairness. Simulation results demonstrate the superiority of the proposed algorithms. Moreover, the adaptive cell-free coverage pattern is observed, which implies a promising way to efficiently serve wide-area IoT devices in the upcoming sixth generation (6G) era

    Rethinking blockchains in the Internet of Things era from a wireless communication perspective

    Get PDF
    Due to the rapid development of the internet of Things (ioT), a massive number of devices are connected to the internet. For these distributed devices in ioT networks, how to ensure their security and privacy becomes a significant challenge. Blockchain technology provides a promising solution to protect the data integrity, provenance, privacy, and consistency for ioT networks. in blockchains, communication is a prerequisite for participants, which are distributed in the system, to reach consensus. However, in ioT networks, most of the devices communicate through wireless links, which are not always reliable. Hence, the communication reliability of ioT devices influences the system security. in this article, we rethink the roles of communication and computing in blockchains by accounting for communication reliability. We analyze the trade-off between communication reliability and computing power in blockchain security, and present a lower bound to the computing power that is needed to conduct an attack with a given communication reliability. Simulation results show that adversarial nodes can succeed in tampering with a block with less computing power by hindering the propagation of blocks from other nodes

    Noninflammatory Changes of Microglia Are Sufficient to Cause Epilepsy.

    Get PDF
    Microglia are well known to play a critical role in maintaining brain homeostasis. However, their role in epileptogenesis has yet to be determined. Here, we demonstrate that elevated mTOR signaling in mouse microglia leads to phenotypic changes, including an amoeboid-like morphology, increased proliferation, and robust phagocytosis activity, but without a significant induction of pro-inflammatory cytokines. We further provide evidence that these noninflammatory changes in microglia disrupt homeostasis of the CNS, leading to reduced synapse density, marked microglial infiltration into hippocampal pyramidal layers, moderate neuronal degeneration, and massive proliferation of astrocytes. Moreover, the mice thus affected develop severe early-onset spontaneous recurrent seizures (SRSs). Therefore, we have revealed an epileptogenic mechanism that is independent of the microglial inflammatory response. Our data suggest that microglia could be an opportune target for epilepsy prevention

    Double QoS guarantee for NOMA-enabled massive MTC networks

    Get PDF
    Massive connections and diverse quality of service (QoS) requirements pose a major challenge for machine-type communication (MTC) networks. In this paper, to satisfy various QoS requirements of a massive number of MTC devices (MTCDs), the devices are divided into multiple clusters based on the QoS characteristics. The cluster access control and intra-cluster resource allocation problems are studied to satisfy the double delay requirements in the access and data transmission phases in a cross-layer approach. Specifically, we formulate an access control problem to maximize the access efficiency with constraints on access and transmission delays. An efficient algorithm is proposed to adaptively adjust the access time intervals and backoff factors of the clusters for different numbers of active MTCDs and transmission rates. Given the access parameters, nonorthogonal multiple access is adopted in resource allocation to maximize the system utility function while guaranteeing the delay requirements for each accessed MTCD. An efficient sequential convex programming iterative algorithm is proposed to solve the NP-hard nonconvex problem with two typical utility objectives: total throughput and consumed power. Simulation results show that the proposed scheme can achieve better performance in terms of access efficiency, delay, throughput, and consumed power than other schemes. The impacts of various parameters, including delay and traffic rate, on the performance are disclosed

    Dual-UAV enabled secure data collection with propulsion limitation

    Get PDF
    Unmanned aerial vehicles (UAVs) have been widely utilized to improve the end-to-end performance of wireless communications. However, its line-of-sight makes UAV communication vulnerable to malicious eavesdroppers. In this paper, we propose two cooperative dual-UAV enabled secure data collection schemes to ensure security, with the practical propulsion energy consumption considered. We first maximize the worst-case average secrecy rate with the average propulsion power limitation, where the scheduling, the transmit power, the trajectory and the velocity of the two UAVs are jointly optimized. To solve the non-convex multivariable problem, we propose an iterative algorithm based on block coordinate descent and successive convex approximation. To further save the on-board energy and prolong the flight time, we then maximize the secrecy energy efficiency of UAV data collection, which is a fractional and mixed integer nonlinear programming problem. Based on the Dinkelbach method, we transform the objective function into an integral expression and propose an iterative algorithm to obtain a suboptimal solution to secrecy energy efficiency maximization. Numerical results show that the average secrecy rate is maximized in the first scheme with propulsion limitation, while in the second scheme, the secrecy energy efficiency is maximized with the optimal velocity to save propulsion power and improve secrecy rate simultaneously

    Secure UAV-to-vehicle communications

    Get PDF
    corecore