723 research outputs found
Wireless Powered Dense Cellular Networks: How Many Small Cells Do We Need?
This paper focuses on wireless powered 5G dense cellular networks, where base
station (BS) delivers energy to user equipment (UE) via the microwave radiation
in sub-6 GHz or millimeter wave (mmWave) frequency, and UE uses the harvested
energy for uplink information transmission. By addressing the impacts of
employing different number of antennas and bandwidths at lower and higher
frequencies, we evaluate the amount of harvested energy and throughput in such
networks. Based on the derived results, we obtain the required small cell
density to achieve an expected level of harvested energy or throughput. Also,
we obtain that when the ratio of the number of sub-6 GHz BSs to that of the
mmWave BSs is lower than a given threshold, UE harvests more energy from a
mmWave BS than a sub-6 GHz BS. We find how many mmWave small cells are needed
to perform better than the sub-6 GHz small cells from the perspectives of
harvested energy and throughput. Our results reveal that the amount of
harvested energy from the mmWave tier can be comparable to the sub-6 GHz
counterpart in the dense scenarios. For the same tier scale, mmWave tier can
achieve higher throughput. Furthermore, the throughput gap between different
mmWave frequencies increases with the mmWave BS density.Comment: pages 1-14, accepted by IEEE Journal on Selected Areas in
Communication
Research and Implementation of Web Service Inheritance and Interface Web Service
Web Service (WS) and SOA (Service-Oriented Ar-chitecture) are now widely used. The most important application of SOA is connecting various business systems that automate an enterprise\u27s business processes. A new extension of Web Service definition and implementation-Inheritance of web service is pro-posed in this paper, just like the traditional inheriting mechanism of classes and interfaces in Object-oriented programming. It makes web service development and deployment more flexible, extendable and re-usable, and brings new thoughts and strengths to the implementation of SOA
Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy
This paper studies physical layer security in a wireless ad hoc network with
numerous legitimate transmitter-receiver pairs and eavesdroppers. A hybrid
full-/half-duplex receiver deployment strategy is proposed to secure legitimate
transmissions, by letting a fraction of legitimate receivers work in the
full-duplex (FD) mode sending jamming signals to confuse eavesdroppers upon
their information receptions, and letting the other receivers work in the
half-duplex mode just receiving their desired signals. The objective of this
paper is to choose properly the fraction of FD receivers for achieving the
optimal network security performance. Both accurate expressions and tractable
approximations for the connection outage probability and the secrecy outage
probability of an arbitrary legitimate link are derived, based on which the
area secure link number, network-wide secrecy throughput and network-wide
secrecy energy efficiency are optimized respectively. Various insights into the
optimal fraction are further developed and its closed-form expressions are also
derived under perfect self-interference cancellation or in a dense network. It
is concluded that the fraction of FD receivers triggers a non-trivial trade-off
between reliability and secrecy, and the proposed strategy can significantly
enhance the network security performance.Comment: Journal paper, double-column 12 pages, 9 figures, accepted by IEEE
Transactions on Wireless Communications, 201
- …