60 research outputs found

    Evaluating the effect of self-interference on the performance of full-duplex two-way relaying communication with energy harvesting

    Get PDF
    In this paper, we study the throughput and outage probability (OP) of two-way relaying (TWR) communication system with energy harvesting (EH). The system model consists two source nodes and a relay node which operates in full-duplex (FD) mode. The effect of self-interference (SI) due to the FD operation on the system performance is evaluated for both one-way full duplex (OWFD) and two-way full duplex (TWFD) diagrams where the amplify-and-forward (AF) relay node collects energy harvesting with the time switching (TS) scheme. We first propose an individual OP expression for each specific source. Then, we derive the exact closed-form overall OP expression for the OWFD diagram. For the TWFD diagram, we propose an approximate closed-form expression for the overall OP. The overall OP comparison among hybrid systems (Two-Way Half-Duplex (TWHD), OWFD, TWFD) are also discussed.  Finally, the numerical/simulated results are presented for Rayleigh fading channels to demonstrate the correction of the proposed analysis

    On The Performance of Underlay Relay Cognitive Networks

    Get PDF
    The bit error rate (BER) performance of underlay relay cognitive networks in the presence of Rayleigh fading is thoroughly analyzed in this paper. New exact and asymptotic analytic expressions under consideration of both interference power constraint and maximum transmit power constraint are derived in closed-form and are extensively corroborated by Monte-Carlo simulations. These expressions facilitate in evaluating effectively the network performance behaviour in key operation parameters as well as in optimizing system parameters. A multitude of analytical results expose that underlay relay cognitive networks experience the performance saturation phenomena while their performance considerably depends on the number of hops for the linear network model. Additionally, optimum relay position is significantly dependent of maximum transmit power, maximum interference power, and licensee location. Moreover, the appropriate order of locating unlicensees with different maximum transmit power levels can dramatically improve the network performance

    The Comparison of Characteristics in Tin Doped Indium Oxide (ITO) Synthesized via Nonaqueous Sol-Gel and Solvothermal Process

    Full text link
    Tin doped indium oxide nanoparticles were synthesized by nonaqueous sol-gel method and solvothermal process from indium acetylacetonate (In(acac)3) and tin bis(acetylacetonate)dichloride (Sn(acac)2Cl2) in oleyamine as the starting materials. The structure and morphology of ITO samples were analyzed by XRD and TEM. The electrical conductivy and specific surface area of both ITO samples were also determined and compared to each other. The ITO prepared via solvothermal method showed better results that prepared by nonaqueous sol-gel method

    Security Improvement for Energy Harvesting based Overlay Cognitive Networks with Jamming-Assisted Full-Duplex Destinations

    Get PDF
    This work investigates the secrecy capability of energy harvesting based overlay cognitive networks (EHOCNs). To this end, we assume that a message by a licensed transmitter is relayed by an unlicensed sender. Critically, the unlicensed sender uses energy harvested from licensed signals, enhancing the overall energy efficiency and maintaining the integrity of licensed communications. To secure messages broadcast by the unlicensed sender against the wire-tapper, full-duplex destinations - unlicensed recipient and licensed receiver - jam the eavesdropper at the same time they receive signals from the unlicensed sender. To this effect, we derive closed-form formulas for the secrecy outage probability, which then quantify the security performance of both unlicensed and licensed communications for EHOCNs with jamming-assisted full-duplex destinations, namely EHOCNwFD. In addition, optimum operating parameters are established, which can serve as essential design guidelines of such systems.acceptedVersionPeer reviewe
    corecore