[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (135)

Search Parameters:
Keywords = successful transmission probability

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 1176 KiB  
Article
A Sparse Feature-Based Mixed Signal Frequencies Detecting for Unmanned Aerial Vehicle Communications
by Yang Wang, Yongxin Feng, Fan Zhou, Xi Chen, Jian Wang and Peiying Zhang
Drones 2025, 9(1), 34; https://doi.org/10.3390/drones9010034 - 6 Jan 2025
Viewed by 375
Abstract
As drone technology develops rapidly and many users emerge in airspace networks, various forms of interference have caused the wireless spectrum to exhibit a dense, diverse, and dynamic trend. This increases the probability of spectrum conflicts among users and seriously impacts the quality [...] Read more.
As drone technology develops rapidly and many users emerge in airspace networks, various forms of interference have caused the wireless spectrum to exhibit a dense, diverse, and dynamic trend. This increases the probability of spectrum conflicts among users and seriously impacts the quality and transmission rate of communication. How to effectively improve the detection accuracy of each frequency component in the electromagnetic space mixed signals and avoid spectrum conflicts will become one of the crucial issues currently faced by unmanned aerial vehicle (UAV) communication technologies. However, the existing methods overlook the mutual interference among the component signals as well as the noise during the frequency detection process, which affects their detection performance. In this paper, we propose a mixed-signal frequency detection method based on the reconstruction of sparse feature signals. Without information such as frequency range, bandwidth, and the number of components, it can utilize the autoencoder network to learn the sparse features of each component signal in the high-dimensional frequency domain space and construct a nonlinear reconstruction function to reconstruct each component signal in the mixed signal, thereby realizing the separation of signals. On this basis, complex dilated convolution and deconvolution are used successively to perform feature extraction on the separated signals, which enhances the receptive field and frequency resolution ability of the network for signals, reduces the interference between noise and different component signals, and realizes the accurate estimation of the number of components and carrier frequencies. The simulation results show that when SNR 6 dB, the detection accuracy of the number of component signals is greater than 96.3%. The detection error and detection accuracy of component frequencies are less than 3.19% and greater than 90.7%, respectively. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of drone application scenarios.</p>
Full article ">Figure 2
<p>Frequency detection flow based on sparse feature signal reconstruction.</p>
Full article ">Figure 3
<p>Signal separation network structure design.</p>
Full article ">Figure 4
<p>Component number detection network structure design.</p>
Full article ">Figure 5
<p>Component frequency detection network structure design.</p>
Full article ">Figure 6
<p>Signal separation error of SFsRNet method.</p>
Full article ">Figure 7
<p>Comparison of the Time Domain Characteristics Between Separated and Original Sub-Signals. Panels (<b>a</b>–<b>d</b>) illustrate the separation results of individual component signals from the mixed-signal. Each component signal exhibits distinct amplitude, phase, and frequency characteristics. The blue right triangle denotes the original signal, while the yellow upward triangle and the red circle represent the separation results under signal-to-noise ratios (SNR) of 0 dB and 10 dB, respectively.</p>
Full article ">Figure 8
<p>Comparison of component number detection accuracy.</p>
Full article ">Figure 9
<p>Comparison of component frequency detection error.</p>
Full article ">Figure 10
<p>Comparison of frequency detection error with different number of components. (<b>a</b>) Frequency detection error value when <span class="html-italic">m</span> = 2. (<b>b</b>) Frequency detection error value when <span class="html-italic">m</span> = 3. (<b>c</b>) Frequency detection error value when <span class="html-italic">m</span> = 3. (<b>d</b>) Frequency detection error value when <span class="html-italic">m</span> = 3.</p>
Full article ">Figure 11
<p>Comparison of component frequency detection accuracy (<math display="inline"><semantics> <mrow> <mi>ε</mi> <mo>=</mo> <mn>0.02</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 12
<p>Comparison of component frequency detection accuracy (<math display="inline"><semantics> <mrow> <mi>ε</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 13
<p>Comparison of frequency detection accuracy with different number of components (<math display="inline"><semantics> <mrow> <mi>ε</mi> <mo>=</mo> <mn>0.02</mn> </mrow> </semantics></math>). (<b>a</b>) Frequency detection accuracy value when <span class="html-italic">m</span> = 2. (<b>b</b>) Frequency detection accuracy value when <span class="html-italic">m</span> = 3. (<b>c</b>) Frequency detection accuracy value when <span class="html-italic">m</span> = 3. (<b>d</b>) Frequency detection accuracy value when <span class="html-italic">m</span> = 3.</p>
Full article ">
17 pages, 2752 KiB  
Article
Fountain Coding Based Two-Way Relaying Cognitive Radio Networks Employing Reconfigurable Intelligent Surface and Energy Harvesting
by Hieu T. Nguyen, Nguyen-Thi Hau, Nguyen Van Toan, Vo Ta Ty and Tran Trung Duy
Telecom 2025, 6(1), 1; https://doi.org/10.3390/telecom6010001 - 25 Dec 2024
Viewed by 340
Abstract
This paper examines two-way relaying cognitive radio networks utilizing fountain coding (FC), reconfigurable intelligent surfaces (RIS), and radio frequency energy harvesting (EH). In the proposed schemes, two secondary sources attempt to exchange data with each other through the assistance of an RIS deployed [...] Read more.
This paper examines two-way relaying cognitive radio networks utilizing fountain coding (FC), reconfigurable intelligent surfaces (RIS), and radio frequency energy harvesting (EH). In the proposed schemes, two secondary sources attempt to exchange data with each other through the assistance of an RIS deployed in the network. Using FC, one source sends its encoded packets to the other source, which must collect enough packets for a successful data recovery. The transmit power of the two sources is adjusted according to an interference constraint given by a primary user and the energy harvested from a power station. In the conventional scheme, one source continuously transmits FC packets to the other, using the maximum number of transmissions allowed. In the modified scheme, as soon as one source collects a sufficient number of FC packets, it notifies the other source to stop transmission. We derive closed-form expressions of outage probability (OP) at each source, system outage probability (SOP), and average number of FC-packet transmissions for the successful data exchange of the considered schemes over Rayleigh fading channels. Simulation results are provided to validate our analysis, to compare the performance of the considered schemes, and to examine the impact of key parameters on performance. Full article
(This article belongs to the Special Issue Performance Criteria for Advanced Wireless Communications)
Show Figures

Figure 1

Figure 1
<p>The proposed FC-based TWR CR scheme.</p>
Full article ">Figure 2
<p><math display="inline"><semantics> <mrow> <msub> <mi mathvariant="sans-serif">Φ</mi> <mi>i</mi> </msub> </mrow> </semantics></math> as a function of <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <mfenced> <mrow> <mi>dB</mi> </mrow> </mfenced> </mrow> </semantics></math> with <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mrow> <mi>SB</mi> </mrow> </msub> <mo>=</mo> <mn>0.7</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.35</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p><math display="inline"><semantics> <mrow> <msub> <mi mathvariant="sans-serif">Φ</mi> <mi>i</mi> </msub> </mrow> </semantics></math> as a function of <math display="inline"><semantics> <mi>α</mi> </semantics></math> with <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <mo>=</mo> <mn>15</mn> <mtext> </mtext> <mfenced> <mrow> <mi>dB</mi> </mrow> </mfenced> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>OP of the <math display="inline"><semantics> <mrow> <mrow> <mi>Cov-Scm</mi> </mrow> </mrow> </semantics></math> scheme as a function of <math display="inline"><semantics> <mi mathvariant="sans-serif">Δ</mi> </semantics></math> (dB) when <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mrow> <mi>SB</mi> </mrow> </msub> <mo>=</mo> <mn>0.35</mn> <mo>,</mo> </mrow> </semantics></math> <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mrow> <mi>max</mi> </mrow> </msub> <mo>=</mo> <mn>6</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>OP of the <math display="inline"><semantics> <mrow> <mrow> <mi>Mod-Scm</mi> </mrow> </mrow> </semantics></math> scheme as a function of <math display="inline"><semantics> <mi mathvariant="sans-serif">Δ</mi> </semantics></math> (dB) when <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mrow> <mi>SB</mi> </mrow> </msub> <mo>=</mo> <mn>0.35</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.5</mn> <mo>,</mo> </mrow> </semantics></math> <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mrow> <mi>max</mi> </mrow> </msub> <mo>=</mo> <mn>6</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>SOP as a function of <math display="inline"><semantics> <mi mathvariant="sans-serif">Δ</mi> </semantics></math> (dB) when <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mrow> <mi>SB</mi> </mrow> </msub> <mo>=</mo> <mn>0.35</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.5</mn> <mo>,</mo> </mrow> </semantics></math> <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mrow> <mi>max</mi> </mrow> </msub> <mo>=</mo> <mn>6</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>OP and <math display="inline"><semantics> <mrow> <mi>SOP</mi> </mrow> </semantics></math> as a function of <math display="inline"><semantics> <mi>α</mi> </semantics></math> when <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <mo>=</mo> </mrow> </semantics></math>8.5 dB, <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mrow> <mi>SB</mi> </mrow> </msub> <mo>=</mo> <mn>0.65</mn> <mo>,</mo> </mrow> </semantics></math><math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mrow> <mi>max</mi> </mrow> </msub> <mo>=</mo> <mn>7</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p>OP and <math display="inline"><semantics> <mrow> <mi>SOP</mi> </mrow> </semantics></math> as a function of <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mrow> <mi>SB</mi> </mrow> </msub> </mrow> </semantics></math> when <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <mo>=</mo> </mrow> </semantics></math>11 dB, <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.375</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mrow> <mi>max</mi> </mrow> </msub> <mo>=</mo> <mn>6</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 9
<p>The average number of transmissions for the successful data exchange as a function of <math display="inline"><semantics> <mi mathvariant="sans-serif">Δ</mi> </semantics></math> (dB) when <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mrow> <mi>SB</mi> </mrow> </msub> <mo>=</mo> <mn>0.4</mn> <mo>,</mo> </mrow> </semantics></math> <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mrow> <mi>max</mi> </mrow> </msub> <mo>=</mo> <mn>7</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 10
<p>The average number of transmissions for the successful data exchange as a function of <math display="inline"><semantics> <mi>α</mi> </semantics></math> when <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <mo>=</mo> <mn>8.5</mn> </mrow> </semantics></math> dB, <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mrow> <mi>max</mi> </mrow> </msub> <mo>=</mo> <mn>7</mn> </mrow> </semantics></math>.</p>
Full article ">
12 pages, 592 KiB  
Article
Unmanned-Aerial-Vehicle-Assisted Secure Free Space Optical Transmission in Internet of Things: Intelligent Strategy for Optimal Fairness
by Fang Xu and Mingda Dong
Sensors 2024, 24(24), 8070; https://doi.org/10.3390/s24248070 - 18 Dec 2024
Viewed by 385
Abstract
In this article, we consider an UAV (unmanned aerial vehicle)-assisted free space optical (FSO) secure communication network. Since FSO signal is impossible to detect by eavesdroppers without proper beam alignment and security authentication, a BS employs FSO technique to transfer information to multiple [...] Read more.
In this article, we consider an UAV (unmanned aerial vehicle)-assisted free space optical (FSO) secure communication network. Since FSO signal is impossible to detect by eavesdroppers without proper beam alignment and security authentication, a BS employs FSO technique to transfer information to multiple authenticated sensors, to improve the transmission security and reliability with the help of an UAV relay with decode and forward (DF) mode. All the sensors need to first send information to the UAV to obtain security authentication, and then the UAV forwards corresponding information to them. Successive interference cancellation (SIC) is used to decode the information received at the UAV and all authenticated sensors. With consideration of fairness, we introduce a statistical metric for evaluating the network performance, i.e., the maximum decoding outage probability for all authenticated sensors. In particular, applying an intelligent approach, we obtain a near-optimal scheme for secure transmit power allocation. With a well-trained allocation scheme, approximate closed-form expressions for optimal transmit power levels can be obtained. Through some numerical examples, we illustrate the various design trade-offs for such a system. Additionally, the validity of our approach was verified by comparing with the result from exhaustive search. In particular, the result with DRL was only 0.3% higher than that with exhaustive search. These results can provide some important guidelines for the fairness-aware design of UAV-assisted secure FSO communication networks. Full article
(This article belongs to the Special Issue Advances in Security for Emerging Intelligent Systems)
Show Figures

Figure 1

Figure 1
<p>Configuration of UAV-assisted FSO communication network.</p>
Full article ">Figure 2
<p>The configuration of the employed deep neural networks.</p>
Full article ">Figure 3
<p>The minimum value for the maximum outage probability for the exhaustive search and deep reinforcement learning, <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mrow> <mi>S</mi> <mi>R</mi> </mrow> </msub> <mo>=</mo> <mn>13</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mrow> <mi>S</mi> <mi>R</mi> </mrow> </msub> <mo>=</mo> <mn>0.4</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <msub> <mi>α</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>1</mn> </mrow> </msub> </semantics></math><math display="inline"><semantics> <mrow> <mspace width="3.33333pt"/> <mo>=</mo> <mn>13</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>1</mn> </mrow> </msub> <mo>=</mo> <mn>7.5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>1</mn> </mrow> </msub> <mo>=</mo> <mn>1.7</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mn>13.5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mn>8</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mn>2.1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <msub> <mi>α</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>3</mn> </mrow> </msub> </semantics></math><math display="inline"><semantics> <mrow> <mspace width="3.33333pt"/> <mo>=</mo> <mn>11.5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>3</mn> </mrow> </msub> <mo>=</mo> <mn>7.2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>3</mn> </mrow> </msub> <mo>=</mo> <mn>2.4</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Near-optimal statistical transmit power levels for the signals of all machines, <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mrow> <mi>S</mi> <mi>R</mi> </mrow> </msub> <mo>=</mo> <mn>13</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mrow> <mi>S</mi> <mi>R</mi> </mrow> </msub> <mo>=</mo> <mn>0.4</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <msub> <mi>α</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>1</mn> </mrow> </msub> </semantics></math><math display="inline"><semantics> <mrow> <mspace width="3.33333pt"/> <mo>=</mo> <mn>13</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>1</mn> </mrow> </msub> <mo>=</mo> <mn>7.5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>1</mn> </mrow> </msub> <mo>=</mo> <mn>1.7</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mn>13.5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mn>8</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mn>2.1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <msub> <mi>α</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>3</mn> </mrow> </msub> </semantics></math><math display="inline"><semantics> <mrow> <mspace width="3.33333pt"/> <mo>=</mo> <mn>11.5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>3</mn> </mrow> </msub> <mo>=</mo> <mn>7.2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>3</mn> </mrow> </msub> <mo>=</mo> <mn>2.4</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>The average reward over 100 consecutive steps for the training of the statistical optimal scheme.</p>
Full article ">
13 pages, 548 KiB  
Article
Age of Information Analysis for Multi-Priority Queue and Non-Orthoganal Multiple Access (NOMA)-Enabled Cellular Vehicle-to-Everything in Internet of Vehicles
by Zheng Zhang, Qiong Wu, Pingyi Fan and Qiang Fan
Sensors 2024, 24(24), 7966; https://doi.org/10.3390/s24247966 - 13 Dec 2024
Viewed by 511
Abstract
With the development of Internet of Vehicles (IoV) technology, the need for real-time data processing and communication in vehicles is increasing. Traditional request-based methods face challenges in terms of latency and bandwidth limitations. Mode 4 in cellular vehicle-to-everything (C-V2X), also known as autonomous [...] Read more.
With the development of Internet of Vehicles (IoV) technology, the need for real-time data processing and communication in vehicles is increasing. Traditional request-based methods face challenges in terms of latency and bandwidth limitations. Mode 4 in cellular vehicle-to-everything (C-V2X), also known as autonomous resource selection, aims to address latency and overhead issues by dynamically selecting communication resources based on real-time conditions. However, semi-persistent scheduling (SPS), which relies on distributed sensing, may lead to a high number of collisions due to the lack of centralized coordination in resource allocation. On the other hand, non-orthogonal multiple access (NOMA) can alleviate the problem of reduced packet reception probability due to collisions. Age of Information (AoI) includes the time a message spends in both local waiting and transmission processes and thus is a comprehensive metric for reliability and latency performance. To address these issues, in C-V2X, the waiting process can be extended to the queuing process, influenced by packet generation rate and resource reservation interval (RRI), while the transmission process is mainly affected by transmission delay and success rate. In fact, a smaller selection window (SW) limits the number of available resources for vehicles, resulting in higher collisions when the number of vehicles is increasing rapidly. SW is generally equal to RRI, which not only affects the AoI part in the queuing process but also the AoI part in the transmission process. Therefore, this paper proposes an AoI estimation method based on multi-priority data type queues and considers the influence of NOMA on the AoI generated in both processes in C-V2X system under different RRI conditions. Our experiments show that using multiple priority queues can reduce the AoI of urgent messages in the queue, thereby providing better service about the urgent message in the whole vehicular network. Additionally, applying NOMA can further reduce the AoI of the messages received by the vehicle. Full article
Show Figures

Figure 1

Figure 1
<p>System model.</p>
Full article ">Figure 2
<p>AvgAoI in different queues.</p>
Full article ">Figure 3
<p>AvgAoI in queues.</p>
Full article ">Figure 4
<p><math display="inline"><semantics> <msub> <mi>N</mi> <mi>v</mi> </msub> </semantics></math> = 30.</p>
Full article ">Figure 5
<p><math display="inline"><semantics> <msub> <mi>N</mi> <mi>v</mi> </msub> </semantics></math> = 50.</p>
Full article ">
20 pages, 889 KiB  
Article
Slotted ALOHA Based Practical Byzantine Fault Tolerance (PBFT) Blockchain Networks: Performance Analysis and Optimization
by Ziyi Zhou, Oluwakayode Onireti, Lei Zhang and Muhammad Ali Imran
Sensors 2024, 24(23), 7688; https://doi.org/10.3390/s24237688 - 30 Nov 2024
Viewed by 609
Abstract
Practical Byzantine Fault Tolerance (PBFT) is one of the most popular consensus mechanisms for the consortium and private blockchain technology. It has been recognized as a candidate consensus mechanism for the Internet of Things networks as it offers lower resource requirements and high [...] Read more.
Practical Byzantine Fault Tolerance (PBFT) is one of the most popular consensus mechanisms for the consortium and private blockchain technology. It has been recognized as a candidate consensus mechanism for the Internet of Things networks as it offers lower resource requirements and high performance when compared with other consensus mechanisms such as proof of work. In this paper, by considering the blockchain nodes are wirelessly connected, we model the network nodes distribution and transaction arrival rate as Poisson point process and we develop a framework for evaluating the performance of the wireless PBFT network. The framework utilizes slotted ALOHA as its multiple access technique. We derive the end-to-end success probability of the wireless PBFT network which serves as the basis for obtaining other key performance indicators namely, the optimal transmission interval, the transaction throughput and delay, and the viable area. The viable area represents the minimum PBFT coverage area that guarantees the liveness, safety, and resilience of the PBFT protocol while satisfying a predefined end-to-end success probability. Results show that the transmission interval required to make the wireless PBFT network viable can be reduced if either the end-to-end success probability requirement or the number of faulty nodes is lowered. Full article
Show Figures

Figure 1

Figure 1
<p>Normal case operation of the Practical Byzantine Fault Tolerance (PBFT) network [<a href="#B14-sensors-24-07688" class="html-bibr">14</a>].</p>
Full article ">Figure 2
<p>Spatial distribution of the Practical Byzantine Fault Tolerance (PBFT) network.</p>
Full article ">Figure 3
<p>Illustration of channel contention in wireless PBFT.</p>
Full article ">Figure 4
<p>End-to-end success probability <math display="inline"><semantics> <msub> <mi mathvariant="script">P</mi> <mi>s</mi> </msub> </semantics></math> plotted against the transmission interval for the prepare and commit phases <math display="inline"><semantics> <mrow> <msub> <mi>v</mi> <mi>p</mi> </msub> <mo>=</mo> <msub> <mi>v</mi> <mi>c</mi> </msub> <mo>=</mo> <mi>v</mi> </mrow> </semantics></math>).</p>
Full article ">Figure 5
<p>Effect of increasing the number of nodes <span class="html-italic">n</span> and the transmission interval <span class="html-italic">v</span> on end-to-end success probability.</p>
Full article ">Figure 6
<p>End-to-end transaction throughput of wireless PBFT network.</p>
Full article ">Figure 7
<p>Effect of increasing the number of node <span class="html-italic">n</span> for <math display="inline"><semantics> <mrow> <mi>f</mi> <mo>=</mo> <mo>⌊</mo> <mstyle displaystyle="true"> <mfrac> <mrow> <mi>n</mi> <mo>−</mo> <mn>1</mn> </mrow> <mn>3</mn> </mfrac> </mstyle> <mo>⌋</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p>Effect of the view change on the PBFT confirmation delay.</p>
Full article ">Figure 9
<p>Viable area of PBFT consensus network expressed as a function of the number of nodes <span class="html-italic">n</span>.</p>
Full article ">
22 pages, 8720 KiB  
Article
Structure Design and Reliable Acquisition of Burst Spread Spectrum Signals Without Physical Layer Synchronization Overhead
by Shenfu Pan, Leyu Yin, Yunhua Tan and Yan Wang
Electronics 2024, 13(23), 4586; https://doi.org/10.3390/electronics13234586 - 21 Nov 2024
Viewed by 444
Abstract
In order to improve the concealment and security of a point-to-point transparent forwarding satellite communication system, a signal structure based on aperiodic long code spread spectrum is designed in this paper. This structure can achieve reliable signal acquisition without special physical layer synchronization [...] Read more.
In order to improve the concealment and security of a point-to-point transparent forwarding satellite communication system, a signal structure based on aperiodic long code spread spectrum is designed in this paper. This structure can achieve reliable signal acquisition without special physical layer synchronization overhead, which can effectively shorten signal transmission time and improve the concealment of communication. In addition, the performance of burst spread spectrum signal acquisition is analyzed in detail by establishing a mathematical model, and the influencing factors and design criteria of the matching filter length for aperiodic long code acquisition are determined. On this basis, a matched filter acquisition method based on high-power clock multiplexing and an adaptive decision threshold design method based on an auxiliary channel are proposed. The above methods effectively reduce hardware complexity and resource consumption caused by long code acquisition, and realize reliable acquisition under the condition of low SNR. The simulation results show that under the condition of Eb/N0 = 3 dB, the transmission efficiency for a 128-symbol burst frame can be increased by 50%, thereby significantly reducing the burst communication time. Furthermore, the acquisition success probability can reach 99.99%. Full article
Show Figures

Figure 1

Figure 1
<p>Satellite communication scenario.</p>
Full article ">Figure 2
<p>Physical layer frame structure of a typical burst spread spectrum signal.</p>
Full article ">Figure 3
<p>The processing flow of burst spread spectrum signal based on synchronous overhead.</p>
Full article ">Figure 4
<p>Processing flow of aperiodic long code signal sender without synchronization overhead.</p>
Full article ">Figure 5
<p>Block diagram of the receiver of burst spread spectrum signal.</p>
Full article ">Figure 6
<p>Block diagram of spread spectrum code acquisition based on matched filter.</p>
Full article ">Figure 7
<p>Signal acquisition decision diagram.</p>
Full article ">Figure 8
<p>The relationship between the maximum value of <math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mrow> <mi>a</mi> <mi>c</mi> <mi>q</mi> </mrow> </msub> </mrow> </semantics></math> and <math display="inline"><semantics> <mi>L</mi> </semantics></math>.</p>
Full article ">Figure 9
<p>Comparison of non-multiplexed and multiplexed long code matched filters.</p>
Full article ">Figure 10
<p>Acquisition algorithm based on adaptive threshold decision.</p>
Full article ">Figure 11
<p>The relationship between <math display="inline"><semantics> <mi>λ</mi> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mrow> <mi>a</mi> <mi>c</mi> <mi>q</mi> </mrow> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 12
<p>Acquisition threshold estimation error <math display="inline"><semantics> <mrow> <mo>Δ</mo> <mi>V</mi> </mrow> </semantics></math> diagram.</p>
Full article ">Figure 13
<p><math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mrow> <mi>a</mi> <mi>c</mi> <mi>q</mi> </mrow> </msub> </mrow> </semantics></math> of different <span class="html-italic">L</span> and different SNR varying with <math display="inline"><semantics> <mi>λ</mi> </semantics></math>.</p>
Full article ">Figure 14
<p>Comparison of theoretical curve and Monte Carlo simulation curve.</p>
Full article ">Figure 15
<p>The maximum and minimum normalized thresholds when the target acquisition success probability <math display="inline"><semantics> <mi>γ</mi> </semantics></math> is 0.9999.</p>
Full article ">Figure 16
<p>Acquisition simulation diagram when Eb/N0 = 3 dB, L = 128.</p>
Full article ">Figure 17
<p>A successful acquisition of the Monte Carlo simulation.</p>
Full article ">
20 pages, 3578 KiB  
Article
TOAR: Toward Resisting AS-Level Adversary Correlation Attacks Optimal Anonymous Routing
by Hui Zhao and Xiangmei Song
Mathematics 2024, 12(23), 3640; https://doi.org/10.3390/math12233640 - 21 Nov 2024
Viewed by 492
Abstract
The Onion Router (Tor), as the most widely used anonymous network, is vulnerable to traffic correlation attacks by powerful passive adversaries, such as Autonomous Systems (AS). AS-level adversaries increase their chances of executing correlation attacks by manipulating the underlying routing, thereby compromising anonymity. [...] Read more.
The Onion Router (Tor), as the most widely used anonymous network, is vulnerable to traffic correlation attacks by powerful passive adversaries, such as Autonomous Systems (AS). AS-level adversaries increase their chances of executing correlation attacks by manipulating the underlying routing, thereby compromising anonymity. Furthermore, these underlying routing detours in the Tor client’s routing inference introduce extra latency. To address this challenge, we propose Toward Resisting AS-level Adversary Correlation Attacks Optimal Anonymous Routing (TOAR). TOAR is a two-stage routing mechanism based on Bayesian optimization within Software Defined Networks (SDN), comprising route search and route forwarding. Specifically, it searches for routes that conform to established policies, avoiding AS that could connect traffic between clients and destinations while maintaining anonymity in the selection of routes that minimize communication costs. To evaluate the anonymity of TOAR, as well as the effectiveness of route searching and the performance of route forwarding, we conduct a detailed analysis and extensive experiments. The analysis and experimental results show that the probability of routing being compromised by correlation attacks is significantly reduced. Compared to classical enumeration-based methods, the success rate of route searching increased by close to 2.5 times, and the forwarding throughput reached 70% of that of the packet transmission. The results show that TOAR effectively improves anonymity while maintaining communication quality, minimizing anonymity loss from AS-level adversaries and reducing high latency from routing detours. Full article
Show Figures

Figure 1

Figure 1
<p>Scenarios of traffic correlation attacks by a single AS-level adversary.</p>
Full article ">Figure 2
<p>System model schematic.</p>
Full article ">Figure 3
<p>Instance of the optimal AS routing problem with policy constraints.</p>
Full article ">Figure 4
<p>Software defined inter-domain programmable interface.</p>
Full article ">Figure 5
<p>Process of route negotiation and route confirmation.</p>
Full article ">Figure 6
<p>Impact of path length <math display="inline"><semantics> <mrow> <mi>n</mi> </mrow> </semantics></math> on the probability <math display="inline"><semantics> <mrow> <mi>d</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>Trend of security policy function <math display="inline"><semantics> <mrow> <mi>d</mi> <mo>(</mo> <mi>p</mi> <mo>,</mo> <mi>k</mi> <mo>,</mo> <mi>m</mi> <mo>,</mo> <mi>n</mi> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p>The <math display="inline"><semantics> <mrow> <mo>∆</mo> <mi>C</mi> </mrow> </semantics></math> statistic of the results.</p>
Full article ">Figure 9
<p>Percentage of search effectiveness.</p>
Full article ">Figure 10
<p>SDN experiment environment.</p>
Full article ">Figure 11
<p>Impact of data size changed on throughput.</p>
Full article ">Figure 12
<p>Communication latency.</p>
Full article ">Figure 13
<p>Throughput of route forwarding.</p>
Full article ">
25 pages, 1006 KiB  
Article
Statistics of the Sum of Double Random Variables and Their Applications in Performance Analysis and Optimization of Simultaneously Transmitting and Reflecting Reconfigurable Intelligent Surface-Assisted Non-Orthogonal Multi-Access Systems
by Bui Vu Minh, Phuong T. Tran, Thu-Ha Thi Pham, Anh-Tu Le, Si-Phu Le and Pavol Partila
Sensors 2024, 24(18), 6148; https://doi.org/10.3390/s24186148 - 23 Sep 2024
Viewed by 798
Abstract
For the future of sixth-generation (6G) wireless communication, simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) technology is emerging as a promising solution to achieve lower power transmission and flawless coverage. To facilitate the performance analysis of RIS-assisted networks, the statistics of the [...] Read more.
For the future of sixth-generation (6G) wireless communication, simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) technology is emerging as a promising solution to achieve lower power transmission and flawless coverage. To facilitate the performance analysis of RIS-assisted networks, the statistics of the sum of double random variables, i.e., the sum of the products of two random variables of the same distribution type, become vitally necessary. This paper applies the statistics of the sum of double random variables in the performance analysis of an integrated power beacon (PB) energy-harvesting (EH)-based NOMA-assisted STAR-RIS network to improve its outage probability (OP), ergodic rate, and average symbol error rate. Furthermore, the impact of imperfect successive interference cancellation (ipSIC) on system performance is also analyzed. The analysis provides the closed-form expressions of the OP and ergodic rate derived for both imperfect and perfect SIC (pSIC) cases. All analyses are supported by extensive simulation results, which help recommend optimized system parameters, including the time-switching factor, the number of reflecting elements, and the power allocation coefficients, to minimize the OP. Finally, the results demonstrate the superiority of the proposed framework compared to conventional NOMA and OMA systems. Full article
(This article belongs to the Special Issue 5G/6G Networks for Wireless Communication and IoT)
Show Figures

Figure 1

Figure 1
<p>STAR-RIS-assisted NOMA system.</p>
Full article ">Figure 2
<p>PDF and CDF for different numbers of STAR-RIS elements (<math display="inline"><semantics> <mrow> <mi>Q</mi> <mo>=</mo> <mn>8</mn> <mo>,</mo> <mn>12</mn> <mo>,</mo> <mn>16</mn> </mrow> </semantics></math>), with <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>Comparison of OPs in a classic channel with varying numbers of STAR-RIS elements <math display="inline"><semantics> <mrow> <mi>Q</mi> <mo>=</mo> <mn>16</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>OPs of two users versus <math display="inline"><semantics> <mi>ρ</mi> </semantics></math> with varying numbers of STAR-RIS elements <math display="inline"><semantics> <mrow> <mi>Q</mi> <mo>=</mo> <mn>8</mn> <mo>,</mo> <mn>32</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>OP versus the target rates with <math display="inline"><semantics> <mrow> <mi>Q</mi> <mo>=</mo> <mn>16</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.9</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>0.1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mo>ℓ</mo> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>ρ</mi> <mo>=</mo> <mn>11</mn> </mrow> </semantics></math> dB.</p>
Full article ">Figure 6
<p>OP versus <math display="inline"><semantics> <msub> <mi>a</mi> <mn>2</mn> </msub> </semantics></math> with <math display="inline"><semantics> <mrow> <mo>ℓ</mo> <mo>=</mo> <mn>0.05</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>ρ</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> dB.</p>
Full article ">Figure 7
<p>OP of the destination versus <math display="inline"><semantics> <mi>α</mi> </semantics></math> with <math display="inline"><semantics> <mrow> <mo>ℓ</mo> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.9</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>0.1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>ρ</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> dB.</p>
Full article ">Figure 8
<p>OP of the STAR-RIS-aided NOMA: Relay networks versus <math display="inline"><semantics> <mi>ρ</mi> </semantics></math> with <math display="inline"><semantics> <mrow> <mo>ℓ</mo> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>Q</mi> <mo>=</mo> <mn>8</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 9
<p>Ergodic rate versus <math display="inline"><semantics> <mi>ρ</mi> </semantics></math> with <math display="inline"><semantics> <mrow> <mo>ℓ</mo> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 10
<p>Ergodic rate versus <span class="html-italic">Q</span> with <math display="inline"><semantics> <mrow> <mo>ℓ</mo> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>ρ</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math> dB.</p>
Full article ">Figure 11
<p>The average SERs of the considered STAR-RIS assisted NOMA system versus <math display="inline"><semantics> <mi>ρ</mi> </semantics></math> for BPSK and 4QAM modulations with <math display="inline"><semantics> <mrow> <mo>ℓ</mo> <mo>=</mo> <mn>0.05</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>Q</mi> <mo>=</mo> <mn>8</mn> </mrow> </semantics></math>.</p>
Full article ">
19 pages, 1523 KiB  
Article
Increasing Population Immunity Prior to Globally-Coordinated Cessation of Bivalent Oral Poliovirus Vaccine (bOPV)
by Nima D. Badizadegan, Steven G. F. Wassilak, Concepción F. Estívariz, Eric Wiesen, Cara C. Burns, Omotayo Bolu and Kimberly M. Thompson
Pathogens 2024, 13(9), 804; https://doi.org/10.3390/pathogens13090804 - 17 Sep 2024
Viewed by 1030
Abstract
In 2022, global poliovirus modeling suggested that coordinated cessation of bivalent oral poliovirus vaccine (bOPV, containing Sabin-strain types 1 and 3) in 2027 would likely increase the risks of outbreaks and expected paralytic cases caused by circulating vaccine-derived polioviruses (cVDPVs), particularly type 1. [...] Read more.
In 2022, global poliovirus modeling suggested that coordinated cessation of bivalent oral poliovirus vaccine (bOPV, containing Sabin-strain types 1 and 3) in 2027 would likely increase the risks of outbreaks and expected paralytic cases caused by circulating vaccine-derived polioviruses (cVDPVs), particularly type 1. The analysis did not include the implementation of planned, preventive supplemental immunization activities (pSIAs) with bOPV to achieve and maintain higher population immunity for types 1 and 3 prior to bOPV cessation. We reviewed prior published OPV cessation modeling studies to support bOPV cessation planning. We applied an integrated global poliovirus transmission and OPV evolution model after updating assumptions to reflect the epidemiology, immunization, and polio eradication plans through the end of 2023. We explored the effects of bOPV cessation in 2027 with and without additional bOPV pSIAs prior to 2027. Increasing population immunity for types 1 and 3 with bOPV pSIAs (i.e., intensification) could substantially reduce the expected global risks of experiencing cVDPV outbreaks and the number of expected polio cases both before and after bOPV cessation. We identified the need for substantial increases in overall bOPV coverage prior to bOPV cessation to achieve a high probability of successful bOPV cessation. Full article
(This article belongs to the Special Issue Human Poliovirus)
Show Figures

Figure 1

Figure 1
<p>Histogram of bOPV pSIAs in the 720 model subpopulations with intensification *. Abbreviations: bOPV, bivalent OPV, pSIA, preventive supplemental immunization activity. * Pakistan and Afghanistan 6 pSIAs (low coverage areas 7 pSIAs), most of the Democratic Republic of the Congo, Nigeria, and Ethiopia 2–3 pSIAs (low coverage areas 4–7 pSIAs), most of India 3 pSIAs (high-risk areas, including UP and Bihar, 5–7 pSIAs), most of Somalia and South Sudan 2 pSIAs (low-coverage areas 7 pSIAs), most of Ukraine 4 pSIAs (high-risk areas 6 pSIAs), Yemen and Papua New Guinea 6 pSIAs, most of Indonesia 1 pSIA (low coverage areas 3–4 pSIAs), most of the Syrian Arab Republic 1 pSIA (low coverage areas 2–3 pSIAs), most of Bangladesh 3 pSIAs (low coverage areas 5 pSIAs), Côte d’Ivoire, Mauritania, Egypt, and Haiti 4 pSIAs, Philippines 3 pSIAs, 3–4 pSIAs in low-coverage areas in modeled subpopulations that include countries such as: Albania, Algeria, Angola, Armenia, Azerbaijan, Benin, Bosnia and Herzegovina, Botswana, Burkina Faso, Burundi, Cambodia, Cameroon, Central African Republic, Chad, Comoros, Congo, Djibouti, Dominican Republic, El Salvador, Equatorial Guinea, Eritrea, Eswatini, Ethiopia, Gabon, Gambia, Georgia, Ghana, Guatemala, Guinea, Guinea-Bissau, Haiti, Honduras, Kazakhstan, Kyrgyzstan, Kenya, Lao People’s Democratic Republic, Lesotho, Liberia, Libya, Madagascar, Malawi, Mali, Mauritius, Montenegro, Morocco, Mozambique, Myanmar, Namibia, Nicaragua, Niger, Papua New Guinea, Philippines, Republic of Moldova, Rwanda, Senegal, Serbia, Sierra Leone, Somalia, State of Palestine, Sudan, Tajikistan, The Former Yugoslavian Republic of Macedonia, Togo, Tunisia, Turkmenistan, Uganda, Ukraine, United Republic of Tanzania, Viet Nam, Zambia, and Zimbabwe. The global model includes some of these countries due to risks posed by other countries in the same block. Generally, countries with WPV1 R<sub>0</sub> ≥ 10 with any levels of coverage would likely benefit from some pSIAs (e.g., the inclusion of pSIAs in India and Bangladesh), and all countries with subpopulations with coverage less than &lt;60% would likely need 3–4 pSIAs. The model does not provide refined estimates of the number of pSIAs and may not fully account for differential decreases in coverage that occurred during COVID-19 and persist in some countries.</p>
Full article ">Figure 2
<p>Expected annual polio cases for global bivalent oral poliovirus vaccine (bOPV) cessation occurring in 2027 and outbreak response for using monovalent OPV (mOPV) (assumptions and result from the prior study [<a href="#B48-pathogens-13-00804" class="html-bibr">48</a>]), or using updated assumptions for novel OPV (nOPV). Outbreak response scenarios for nOPV (baseline) assume nOPV2 best or nOPV2 worst from 2022 on, and outbreak response for type 1 or 3 using Sabin-strain bOPV until 2027, and then either homotypic nOPV best or nOPV worst for types 1 and 3 (see text and prior studies [<a href="#B48-pathogens-13-00804" class="html-bibr">48</a>,<a href="#B49-pathogens-13-00804" class="html-bibr">49</a>] for assumed characteristics of nOPV best and nOPV worst bounds).</p>
Full article ">Figure 3
<p>Expected annual polio cases for global bivalent OPV (bOPV) cessation in 2027 and outbreak response for type 2 using novel OPV (nOPV) with either nOPV2 best or nOPV2 worst from 2022 on, and outbreak response for type 1 or 3 using Sabin-strain bOPV until 2027, and then either homotypic nOPV best or nOPV worst (see text and prior studies [<a href="#B48-pathogens-13-00804" class="html-bibr">48</a>,<a href="#B49-pathogens-13-00804" class="html-bibr">49</a>] for assumed characteristics of nOPV best and nOPV worst bounds) after bOPV cessation without (baseline) and with additional preventive supplemental immunization activities using bOPV (i.e., intensification) added in some model subpopulations (see text and <a href="#pathogens-13-00804-f001" class="html-fig">Figure 1</a>).</p>
Full article ">
16 pages, 3426 KiB  
Article
Maximizing Upconversion Luminescence of Co-Doped CaF₂:Yb, Er Nanoparticles at Low Laser Power for Efficient Cellular Imaging
by Neha Dubey, Sonali Gupta, Sandeep B. Shelar, K. C. Barick and Sudeshna Chandra
Molecules 2024, 29(17), 4177; https://doi.org/10.3390/molecules29174177 - 3 Sep 2024
Viewed by 1266
Abstract
Upconversion nanoparticles (UCNPs) are well-reported for bioimaging. However, their applications are limited by low luminescence intensity. To enhance the intensity, often the UCNPs are coated with macromolecules or excited with high laser power, which is detrimental to their long-term biological applications. Herein, we [...] Read more.
Upconversion nanoparticles (UCNPs) are well-reported for bioimaging. However, their applications are limited by low luminescence intensity. To enhance the intensity, often the UCNPs are coated with macromolecules or excited with high laser power, which is detrimental to their long-term biological applications. Herein, we report a novel approach to prepare co-doped CaF2:Yb3+ (20%), Er3+ with varying concentrations of Er (2%, 2.5%, 3%, and 5%) at ambient temperature with minimal surfactant and high-pressure homogenization. Strong luminescence and effective red emission of the UCNPs were seen even at low power and without functionalization. X-ray diffraction (XRD) of UCNPs revealed the formation of highly crystalline, single-phase cubic fluorite-type nanostructures, and transmission electron microscopy (TEM) showed co-doped UCNPs are of ~12 nm. The successful doping of Yb and Er was evident from TEM–energy dispersive X-ray analysis (TEM-EDAX) and X-ray photoelectron spectroscopy (XPS) studies. Photoluminescence studies of UCNPs revealed the effect of phonon coupling between host lattice (CaF2), sensitizer (Yb3+), and activator (Er3+). They exhibited tunable upconversion luminescence (UCL) under irradiation of near-infrared (NIR) light (980 nm) at low laser powers (0.28–0.7 W). The UCL properties increased until 3% doping of Er3+ ions, after which quenching of UCL was observed with higher Er3+ ion concentration, probably due to non-radiative energy transfer and cross-relaxation between Yb3+-Er3+ and Er3+-Er3+ ions. The decay studies aligned with the above observation and showed the dependence of UCL on Er3+ concentration. Further, the UCNPs exhibited strong red emission under irradiation of 980 nm light and retained their red luminescence upon internalization into cancer cell lines, as evident from confocal microscopic imaging. The present study demonstrated an effective approach to designing UCNPs with tunable luminescence properties and their capability for cellular imaging under low laser power. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>(<b>a</b>) XRD patterns of pure CaF<sub>2</sub> and different UCNPs, and (<b>b</b>) shifting of the (220) diffraction peak towards the lower angle.</p>
Full article ">Figure 2
<p>TEM micrographs of (<b>a</b>) pure CaF<sub>2</sub> and (<b>b</b>) UCNPs-2 (inset: their HRTEM micrographs showing lattice spacing), SAED patterns of (<b>c</b>) pure CaF<sub>2</sub> and (<b>d</b>) UCNPs-2 (inset: particle size distribution plots obtained from respective TEM micrographs of the figure), and TEM-EDS analysis of (<b>e</b>) pure CaF<sub>2</sub> and (<b>f</b>) UCNPs-2.</p>
Full article ">Figure 3
<p>High-resolution XPS spectra of Ca 2p, Ca 2s, F 1s, and Yb 4d-Er 4d of UCNPs-2.</p>
Full article ">Figure 4
<p>PL spectra of (<b>a</b>) UCNPs-2, (<b>b</b>) UCNPs-2.5, (<b>c</b>) UCNPs-3, and (<b>d</b>) UCNPs-5 under irradiation of 980 nm laser light. Inset of <a href="#molecules-29-04177-f004" class="html-fig">Figure 4</a>a shows the photograph of revealing red emission arising from UCNPs-2 under irradiation of 980 nm laser light.</p>
Full article ">Figure 5
<p>(<b>a</b>) Energy level diagram of co-doped CaF<sub>2</sub>:Yb<sup>3+</sup>, Er<sup>3+</sup> nanoparticles solid; dotted and dashed-doted arrows represent photon absorption or emission, energy transfer, and relaxation processes, respectively; and (<b>b</b>) CIE chromaticity diagram showing color coordinates.</p>
Full article ">Figure 6
<p>(<b>a</b>) Influence of varying amounts of Er<sup>3+</sup> on UCL intensity of UCNPs and (<b>b</b>) decay kinetics for green (λ<sub>em</sub> = 50 nm) and red (λ<sub>em</sub> = 660 nm) emission.</p>
Full article ">Figure 7
<p>Confocal microscopy images of A549 and MCF-7 cells after overnight incubation with UCNPs-2 under 980 nm laser light irradiation (Scale bar: 10 µm).</p>
Full article ">Scheme 1
<p>Schematic representation of synthesis of CaF<sub>2</sub> and CaF<sub>2</sub>:Yb<sup>3+</sup>, Er<sup>3+</sup> UCNPs.</p>
Full article ">
24 pages, 478 KiB  
Article
Energy Consumption Modeling for Heterogeneous Internet of Things Wireless Sensor Network Devices: Entire Modes and Operation Cycles Considerations
by Canek Portillo, Jorge Martinez-Bauset, Vicent Pla and Vicente Casares-Giner
Telecom 2024, 5(3), 723-746; https://doi.org/10.3390/telecom5030036 - 2 Aug 2024
Viewed by 1256
Abstract
Wireless sensor networks (WSNs) and sensing devices are considered to be core components of the Internet of Things (IoT). The performance modeling of IoT–WSN is of key importance to better understand, deploy, and manage this technology. As sensor nodes are battery-constrained, a fundamental [...] Read more.
Wireless sensor networks (WSNs) and sensing devices are considered to be core components of the Internet of Things (IoT). The performance modeling of IoT–WSN is of key importance to better understand, deploy, and manage this technology. As sensor nodes are battery-constrained, a fundamental issue in WSN is energy consumption. Additional issues also arise in heterogeneous scenarios due to the coexistence of sensor nodes with different features. In these scenarios, the modeling process becomes more challenging as an efficient orchestration of the sensor nodes must be achieved to guarantee a successful operation in terms of medium access, synchronization, and energy conservation. We propose a novel methodology to determine the energy consumed by sensor nodes deploying a recently proposed synchronous duty-cycled MAC protocol named Priority Sink Access MAC (PSA-MAC). We model the operation of a WSN with two classes of sensor devices by a pair of two-dimensional Discrete-Time Markov Chains (2D-DTMC), determine their stationary probability distribution, and propose new expressions to compute the energy consumption based solely on the obtained stationary probability distribution. This new approach is more systematic and accurate than previously proposed ones. The new methodology to determine energy consumption takes into account different specific features of the PSA-MAC protocol as: (i) the synchronization among sensor nodes; (ii) the normal and awake operation cycles to ensure synchronization among sensor nodes and energy conservation; (iii) the two periods that compose a full operation cycle: the data and sleep periods; (iv) two transmission schemes, SPT (single packet transmission) and APT (aggregated packet transmission) (v) the support of multiple sensor node classes; and (vi) the support of different priority assignments per class of sensor nodes. The accuracy of the proposed methodology has been validated by an independent discrete-event-based simulation model, showing that very precise results are obtained. Full article
Show Figures

Figure 1

Figure 1
<p>Heterogeneous WSN scenario with <math display="inline"><semantics> <mrow> <mi mathvariant="normal">C</mi> <mn>1</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi mathvariant="normal">C</mi> <mn>1</mn> </mrow> </semantics></math> SNs, and corresponding <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>1</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 2
<p>Transmission process in a transmission cycle for a heterogeneous WSN with two classes of nodes.</p>
Full article ">Figure 3
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>1</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying SPT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 4
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>2</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying SPT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 5
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>1</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 6
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>2</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 7
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>1</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 8
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>2</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 9
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>1</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 10
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>2</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 11
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>2</mn> </mrow> </semantics></math> per cycle due to PF transmissions with success and failure, and to overhearing, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 12
<p>Average packet delay for both SNs classes.</p>
Full article ">Figure 13
<p>Average relative errors of the current and previous (Pre-method) energy computation methodologies.</p>
Full article ">
24 pages, 1104 KiB  
Article
A Learning-Based Energy-Efficient Device Grouping Mechanism for Massive Machine-Type Communication in the Context of Beyond 5G Networks
by Rubbens Boisguene, Ibrahim Althamary and Chih-Wei Huang
J. Sens. Actuator Netw. 2024, 13(3), 33; https://doi.org/10.3390/jsan13030033 - 28 May 2024
Cited by 1 | Viewed by 1361
Abstract
With the increasing demand for high data rates, low delay, and extended battery life, managing massive machine-type communication (mMTC) in the beyond 5G (B5G) context is challenging. MMTC devices, which play a role in developing the Internet of Things (IoT) and smart cities, [...] Read more.
With the increasing demand for high data rates, low delay, and extended battery life, managing massive machine-type communication (mMTC) in the beyond 5G (B5G) context is challenging. MMTC devices, which play a role in developing the Internet of Things (IoT) and smart cities, need to transmit short amounts of data periodically within a specific time frame. Although blockchain technology is utilized for secure data storage and transfer while digital twin technology provides real-time monitoring and management of the devices, issues such as constrained time delays and network congestion persist. Without a proper data transmission strategy, most devices would fail to transmit in time, thus defying their relevance and purpose. This work investigates the problem of massive random access channel (RACH) attempts while emphasizing the energy efficiency and access latency for mMTC devices with critical missions in B5G networks. Using machine learning techniques, we propose an attention-based reinforcement learning model that orchestrates the device grouping strategy to optimize device placement. Thus, the model guarantees a higher probability of success for the devices during data transmission access, eventually leading to more efficient energy consumption. Through thorough quantitative simulations, we demonstrate that the proposed learning-based approach significantly outperforms the other baseline grouping methods. Full article
Show Figures

Figure 1

Figure 1
<p>The communication scheme between applications passing tasks to MTDs.</p>
Full article ">Figure 2
<p>The task execution in groups from an application perspective.</p>
Full article ">Figure 3
<p>The task execution in groups from a device perspective.</p>
Full article ">Figure 4
<p>The RL structure for massive MTC devices performing an RACH to access the B5G network. Following the reward, the agent optimizes its policy to group the devices further in the current environment.</p>
Full article ">Figure 5
<p>Success and failure probabilities vs. number of preambles (k).</p>
Full article ">Figure 6
<p>Miss rate results of the different scenarios.</p>
Full article ">Figure 7
<p>Total energy consumption per method.</p>
Full article ">Figure 8
<p>Overall RACH-access delay per collision percentage.</p>
Full article ">Figure 9
<p>Probability density function of latency by different methods.</p>
Full article ">
20 pages, 333 KiB  
Review
Progress in Paratuberculosis Control Programmes for Dairy Herds
by Maarten F. Weber, David Kelton, Susanne W. F. Eisenberg and Karsten Donat
Animals 2024, 14(7), 1127; https://doi.org/10.3390/ani14071127 - 7 Apr 2024
Cited by 3 | Viewed by 2261
Abstract
While paratuberculosis control has been studied for over a century, knowledge gaps still exist regarding the uptake and efficacy of control programmes. This narrative review aims to summarise studies on control programmes presented at the IDF ParaTB Fora in 2021 and 2022 and [...] Read more.
While paratuberculosis control has been studied for over a century, knowledge gaps still exist regarding the uptake and efficacy of control programmes. This narrative review aims to summarise studies on control programmes presented at the IDF ParaTB Fora in 2021 and 2022 and the International Colloquium on Paratuberculosis in 2022. Studies were grouped by topic as follows: successful control, field studies, education and extension, voluntary and compulsory control programmes, and surveillance. Various Map control programmes resulted in a decreasing animal and herd level Map prevalence. Long-term stakeholder commitment, stable funding, involvement of herd veterinarians and incentives for farmers to participate were shown to be pivotal for long-term success. Control measures focused on vertical and calf-to-calf transmission may improve Map control in infected herds. Easy-to-capture visualisation of surveillance test results to inform participants on the progress of Map control in their herds was developed. The probability of freedom from disease and estimated within-herd prevalence were identified as good candidates for categorisation of herds to support low-risk trade of cattle. Results of the surveillance schemes may inform genetic selection for resistance to Map infection. In conclusion, successful paratuberculosis control is feasible at both the herd and country level provided that crucial prerequisites are met. Full article
(This article belongs to the Section Veterinary Clinical Studies)
21 pages, 992 KiB  
Article
Modeling and Performance Analysis of mmWave and WiFi-Based Vehicle Communications
by Mohamed Rjab, Aymen Omri, Seifeddine Bouallegue, Hela Chamkhia and Ridha Bouallegue
Electronics 2024, 13(7), 1344; https://doi.org/10.3390/electronics13071344 - 3 Apr 2024
Cited by 1 | Viewed by 1067
Abstract
Vehicle -to-vehicle (V2V) communications are crucial for enhancing road network safety and efficiency. With the increasing demand for bandwidth in V2V services, exploring innovative solutions has become imperative. This study explores a comparative analysis of mmWave and WiFi transmission technologies, with a specific [...] Read more.
Vehicle -to-vehicle (V2V) communications are crucial for enhancing road network safety and efficiency. With the increasing demand for bandwidth in V2V services, exploring innovative solutions has become imperative. This study explores a comparative analysis of mmWave and WiFi transmission technologies, with a specific focus on line-of-sight (LoS) and non-line-of-sight (NLoS) scenarios in both 2D and 3D modeling environments. The use of stochastic geometry tools allows a realistic modeling of the random positioning of vehicles within the V2V system framework, resulting in accurate expressions for the successful transmission probability (STP) and average throughput (AT) for both communication systems. To validate our analytical findings, Monte Carlo simulations have been employed, offering a comprehensive evaluation of mmWave and WiFi performance. Simulation results highlight that mmWave systems outperform in scenarios with short transmission distances and low vehicle density while WiFi systems demonstrate greater efficiency for longer transmission distances. Full article
(This article belongs to the Topic Innovation, Communication and Engineering)
Show Figures

Figure 1

Figure 1
<p>Illustration of a V2V communication example with (<b>a</b>) 3D modeling and (<b>b</b>) 2D modeling.</p>
Full article ">Figure 2
<p>Illustration of V2V LoS communication scenarios.</p>
Full article ">Figure 3
<p>LoS probability vs. transmission distance with different vehicle densities values.</p>
Full article ">Figure 4
<p>STP vs. transmission distance in an LoS scenario.</p>
Full article ">Figure 5
<p>STP vs. transmission distance in an NLoS scenario.</p>
Full article ">Figure 6
<p>Average throughput vs. transmission distance in an LoS scenario.</p>
Full article ">Figure 7
<p>Average throughput vs. transmission distance in an NLoS scenario.</p>
Full article ">
19 pages, 2945 KiB  
Article
Optimization of Ampacity in High-Voltage Underground Cables with Thermal Backfill Using Dynamic PSO and Adaptive Strategies
by Brayan A. Atoccsa, David W. Puma, Daygord Mendoza, Estefany Urday, Cristhian Ronceros and Modesto T. Palma
Energies 2024, 17(5), 1023; https://doi.org/10.3390/en17051023 - 22 Feb 2024
Cited by 4 | Viewed by 2477
Abstract
This article addresses challenges in the design of underground high-voltage transmission lines, focusing on thermal management and cable ampacity determination. It introduces an innovative proposal that adjusts the dimensions of the backfill to enhance ampacity, contrasting with the conventional approach of increasing the [...] Read more.
This article addresses challenges in the design of underground high-voltage transmission lines, focusing on thermal management and cable ampacity determination. It introduces an innovative proposal that adjusts the dimensions of the backfill to enhance ampacity, contrasting with the conventional approach of increasing the core cable’s cross-sectional area. The methodology employs a particle swarm optimization (PSO) technique with adaptive penalization and restart strategies, implemented in MATLAB for parameter autoadaptation. The article emphasizes more efficient solutions than traditional PSO, showcasing improved convergence and precise results (success probability of 66.1%). While traditional PSO is 81% faster, the proposed PSO stands out for its accuracy. The inclusion of thermal backfill results in an 18.45% increase in cable ampacity, considering variations in soil thermal resistivity, backfill properties, and ambient temperature. Additionally, a sensitivity analysis was conducted, revealing conservative values that support the proposal’s robustness. This approach emerges as a crucial tool for underground installation, contributing to continuous ampacity improvement and highlighting its impact on decision making in energy systems. Full article
(This article belongs to the Special Issue Modeling, Simulation and Optimization of Power System)
Show Figures

Figure 1

Figure 1
<p>Types of underground cable installation in three-phase transmission lines. (<b>a</b>) Trifoil formation, and (<b>b</b>) Flat formation.</p>
Full article ">Figure 2
<p>Underground XLPE single-core cables in a flat arrangement and buried in thermal backfill.</p>
Full article ">Figure 3
<p>Cross-sectional view of the 220 kV XLPE insulated cable [<a href="#B44-energies-17-01023" class="html-bibr">44</a>].</p>
Full article ">Figure 4
<p>Thermo-electric equivalence network model for underground cable.</p>
Full article ">Figure 5
<p>Arrangement of cables and their images on an isothermal plane for the calculation of the <span class="html-italic">F</span>-factor.</p>
Full article ">Figure 6
<p>Flowchart of the proposed algorithms.</p>
Full article ">Figure 7
<p>Characteristic Convergence of PSO for Ampacity Maximization. (<b>a</b>) Proposed PSO, and (<b>b</b>) Traditional PSO.</p>
Full article ">Figure 8
<p>(<b>a</b>) Dispersion and (<b>b</b>) histogram of optimal ampacity with proposed PSO.</p>
Full article ">Figure 9
<p>(<b>a</b>) Dispersion and (<b>b</b>). histogram of optimal ampacity with traditional PSO.</p>
Full article ">Figure 10
<p>Effect of cable spacing on cable ampacity. In the bottom right corner, the flat formation installation is depicted within the thermal backfill.</p>
Full article ">Figure 11
<p>Relationship among Ampacity, Total Cost, and Backfill Volume, Including Their Projections on the Vertical Planes.</p>
Full article ">
Back to TopTop