723 research outputs found

    Wireless Powered Dense Cellular Networks: How Many Small Cells Do We Need?

    Get PDF
    This paper focuses on wireless powered 5G dense cellular networks, where base station (BS) delivers energy to user equipment (UE) via the microwave radiation in sub-6 GHz or millimeter wave (mmWave) frequency, and UE uses the harvested energy for uplink information transmission. By addressing the impacts of employing different number of antennas and bandwidths at lower and higher frequencies, we evaluate the amount of harvested energy and throughput in such networks. Based on the derived results, we obtain the required small cell density to achieve an expected level of harvested energy or throughput. Also, we obtain that when the ratio of the number of sub-6 GHz BSs to that of the mmWave BSs is lower than a given threshold, UE harvests more energy from a mmWave BS than a sub-6 GHz BS. We find how many mmWave small cells are needed to perform better than the sub-6 GHz small cells from the perspectives of harvested energy and throughput. Our results reveal that the amount of harvested energy from the mmWave tier can be comparable to the sub-6 GHz counterpart in the dense scenarios. For the same tier scale, mmWave tier can achieve higher throughput. Furthermore, the throughput gap between different mmWave frequencies increases with the mmWave BS density.Comment: pages 1-14, accepted by IEEE Journal on Selected Areas in Communication

    Research and Implementation of Web Service Inheritance and Interface Web Service

    Get PDF
    Web Service (WS) and SOA (Service-Oriented Ar-chitecture) are now widely used. The most important application of SOA is connecting various business systems that automate an enterprise\u27s business processes. A new extension of Web Service definition and implementation-Inheritance of web service is pro-posed in this paper, just like the traditional inheriting mechanism of classes and interfaces in Object-oriented programming. It makes web service development and deployment more flexible, extendable and re-usable, and brings new thoughts and strengths to the implementation of SOA

    Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy

    Full text link
    This paper studies physical layer security in a wireless ad hoc network with numerous legitimate transmitter-receiver pairs and eavesdroppers. A hybrid full-/half-duplex receiver deployment strategy is proposed to secure legitimate transmissions, by letting a fraction of legitimate receivers work in the full-duplex (FD) mode sending jamming signals to confuse eavesdroppers upon their information receptions, and letting the other receivers work in the half-duplex mode just receiving their desired signals. The objective of this paper is to choose properly the fraction of FD receivers for achieving the optimal network security performance. Both accurate expressions and tractable approximations for the connection outage probability and the secrecy outage probability of an arbitrary legitimate link are derived, based on which the area secure link number, network-wide secrecy throughput and network-wide secrecy energy efficiency are optimized respectively. Various insights into the optimal fraction are further developed and its closed-form expressions are also derived under perfect self-interference cancellation or in a dense network. It is concluded that the fraction of FD receivers triggers a non-trivial trade-off between reliability and secrecy, and the proposed strategy can significantly enhance the network security performance.Comment: Journal paper, double-column 12 pages, 9 figures, accepted by IEEE Transactions on Wireless Communications, 201

    Achieving Customer-Provider Strategic Alignment in IT Outsourcing

    Get PDF
    • …
    corecore