[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (138)

Search Parameters:
Keywords = successful transmission probability

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 6035 KiB  
Article
Enhancing Energy Efficiency of Sensors and Communication Devices in Opportunistic Networks Through Human Mobility Interaction Prediction
by Ambreen Memon, Sardar M. N. Islam, Muhammad Nadeem Ali and Byung-Seo Kim
Sensors 2025, 25(5), 1414; https://doi.org/10.3390/s25051414 - 26 Feb 2025
Viewed by 189
Abstract
The proliferation of smart devices such as sensors and communication devices has necessitated the development of networks that can adopt device-to-device communication for delay-tolerant data transfer and energy efficiency. Therefore, there is a need to develop opportunistic networks to enhance energy efficiency through [...] Read more.
The proliferation of smart devices such as sensors and communication devices has necessitated the development of networks that can adopt device-to-device communication for delay-tolerant data transfer and energy efficiency. Therefore, there is a need to develop opportunistic networks to enhance energy efficiency through improved data routing. A sensor device equipped with computing, communication, and mobility capabilities can opportunistically transfer data to another device, either as a direct recipient or as an intermediary forwarding data to a third device. Routing algorithms designed for such opportunistic networks aim to increase the probability of successful message transmission by leveraging area information derived from historical data to forecast potential encounters. However, accurately determining the precise locations of mobile devices remains highly challenging and necessitates a robust prediction mechanism to provide reliable insights into mobility encounters. In this study, we propose incorporating a random forest regressor (RFR) to predict the future location of mobile users, thereby enhancing message routing efficiency. The RFR utilizes mobility traces from diverse users and is equipped with sensors for computing and communication purposes. These predictions improve message routing performance and reduce energy and bandwidth resource utilization during routine data transmissions. To evaluate the proposed approach, we compared the predictive performance of the RFR against existing benchmark schemes, including the Gaussian process, using real-world mobility data traces. The mobility traces from the University of Southern California (USC) were employed to underpin the simulations. Our findings demonstrate that the RFR significantly outperformed both the Gaussian process and existing methods in predicting mobility encounters. Furthermore, the integration of mobility predictions into device-to-device (D2D) communication and traditional internet networks showed potential energy consumption reductions of up to one-third, highlighting the practical benefits of the proposed approach. The contribution of this research is that it highlights the limitations of existing mobility prediction models and develops new resource optimization and energy-efficient opportunistic networks that overcome these limitations. Full article
(This article belongs to the Special Issue Sensors and Smart City)
Show Figures

Figure 1

Figure 1
<p>Internet infrastructure for the mobility scenario of the university campus.</p>
Full article ">Figure 2
<p>Proposed methodology flowchart.</p>
Full article ">Figure 3
<p>Encounter prediction by the RFR.</p>
Full article ">Figure 4
<p>Gaussian model for encounter prediction.</p>
Full article ">Figure 5
<p>Some samples of the dataset.</p>
Full article ">Figure 6
<p>Encounters observed in the cafeteria.</p>
Full article ">Figure 7
<p>Encounters observed in the library.</p>
Full article ">Figure 8
<p>Encounter prediction using the Gaussian model for the cafeteria.</p>
Full article ">Figure 9
<p>Encounter prediction using the Gaussian model for the library.</p>
Full article ">Figure 10
<p>Encounter prediction using RFR for cafeteria.</p>
Full article ">Figure 11
<p>Encounter prediction using RFR for the library.</p>
Full article ">Figure 12
<p>Random forest and Gaussian prediction.</p>
Full article ">Figure 13
<p>D2D vs. internet architecture energy consumption.</p>
Full article ">
19 pages, 2967 KiB  
Article
The Influence of Climate Variables on Malaria Incidence in Vanuatu
by Jade Sorenson, Andrew B. Watkins and Yuriy Kuleshov
Climate 2025, 13(2), 22; https://doi.org/10.3390/cli13020022 - 22 Jan 2025
Viewed by 644
Abstract
Malaria, a climate-sensitive mosquito-borne disease, is widespread in tropical and subtropical regions, and its elimination is a global health priority. Malaria is endemic to Vanuatu, where elimination campaigns have been implemented with varied success. In this study, climate variables were assessed for their [...] Read more.
Malaria, a climate-sensitive mosquito-borne disease, is widespread in tropical and subtropical regions, and its elimination is a global health priority. Malaria is endemic to Vanuatu, where elimination campaigns have been implemented with varied success. In this study, climate variables were assessed for their correlation with national malaria cases from 2014 to 2023 and used to develop a proof-of-concept model for estimating malaria incidence in Vanuatu. Maximum, minimum, and median temperatures; diurnal temperature variation; median temperature during the 18:00–21:00 mosquito biting period (VUT); median humidity; and precipitation (total and anomaly) were evaluated as predictors at different time lags. It was found that maximum temperature had the strongest correlation with malaria cases and produced the best-performing linear regression model, where malaria cases increased by approximately 43 cases for every degree (°C) increase in monthly maximum temperature. This aligns with similar findings from climate–malaria studies in the Southwest Pacific, where temperature tends to stimulate the development of both Anopheles farauti and Plasmodium vivax, increasing transmission probability. A Bayesian model using maximum temperature and total precipitation at a two-month time lag was more effective in predicting malaria incidence than using maximum temperature or precipitation alone. A Bayesian approach was preferred due to its flexibility with varied data types and prior information about malaria dynamics. This model for predicting malaria incidence in Vanuatu can be adapted to smaller regions or other malaria-affected areas, supporting malaria early warning and preparedness for climate-related health challenges. Full article
Show Figures

Figure 1

Figure 1
<p>Map of Vanuatu with labelled provinces, showing neighbouring countries.</p>
Full article ">Figure 2
<p>Total annual precipitation (mm) aggregated for each Vanuatu province for (<b>a</b>) 2017 and (<b>b</b>) 2022.</p>
Full article ">Figure 3
<p>Annual parasite index measured in total reported cases per 1000 population in each Vanuatu province for (<b>a</b>) 2017 and (<b>b</b>) 2022.</p>
Full article ">Figure 4
<p>Monthly national malaria cases for Vanuatu from 2014 to 2023 inclusive.</p>
Full article ">Figure 5
<p>Posterior plot showing observed national malaria cases and Bayesian model-predicted cases from 2014 to 2023. The predictive model is based on monthly maximum temperature and monthly total precipitation from two months prior.</p>
Full article ">Figure 6
<p>Two angles of a 3D scatterplot comparing observed national malaria cases and Bayesian model-predicted cases 2014–2023 for (<b>a</b>) side view and (<b>b</b>) top view. The predictive model is based on monthly maximum temperature and monthly total precipitation from two months prior.</p>
Full article ">
27 pages, 7688 KiB  
Article
Synthesis and Characterization of PLA/Biochar Bio-Composites Containing Different Biochar Types and Content
by Katerina Papadopoulou, Panagiotis A. Klonos, Apostolos Kyritsis, Evangelia Tarani, Konstantinos Chrissafis, Ondrej Mašek, Konstantinos Tsachouridis, Antonios D. Anastasiou and Dimitrios N. Bikiaris
Polymers 2025, 17(3), 263; https://doi.org/10.3390/polym17030263 - 21 Jan 2025
Viewed by 778
Abstract
A series of poly(lactic acid) (PLA)/biochar (BC) bio-composites filled with low amounts (1–5 wt%) of BC were prepared and characterized. The synthesis involved the in situ ring-opening polymerization (ROP) of lactide in the presence of two different types of BC named SWP550 and [...] Read more.
A series of poly(lactic acid) (PLA)/biochar (BC) bio-composites filled with low amounts (1–5 wt%) of BC were prepared and characterized. The synthesis involved the in situ ring-opening polymerization (ROP) of lactide in the presence of two different types of BC named SWP550 and SWP700, having been produced by pyrolysis of softwood pellets at two different temperatures, 550 and 700 °C, respectively. The bio-composites were characterized by complementary techniques. The successful synthesis of PLA and PLA/BC bio-composites was directly demonstrated by the formation of new bonds, most probably between PLA and BC. Indirect evidence for that was obtained by the systematic molar mass reduction in the presence of BC. BC was found by transmission electron microscopy (TEM) micrographs to be well dispersed at the nanosize level, indicating that in situ polymerization is a technique quite efficient for producing bio-composites with finely dispersed BC additive. The molecular dynamics mapping is performed here via dielectric spectroscopy, moreover, for the first time in these PLA/BC systems. The strong PLA/BC interactions (due to the grafting) led to a systematic deceleration of segmental mobility (elevation of the Tg) in the bio-composites despite the opposite effect expected by the decrease in molar mass with the BC content increasing. In addition, the same interactions and chain-length reduction are responsible for the slight suppression of the PLA’s crystallizability. The effects are slightly stronger for SWP700 as compared to SWP550. The crystal structure is rather similar between the unfilled matrix and the bio-composites, whereas, based on the overall data, the semicrystalline morphology is expected to be tighter in the bio-composites. The thermal stability and decomposition kinetics were also thoroughly studied. All materials exhibit good resistance to thermal degradation. Additionally, the mechanical properties of bio-composites were evaluated by tensile testing and found slightly enhanced at low biochar contents and decreasing thereafter due to the low molecular weight of bio-composites with the larger BC contents. Full article
(This article belongs to the Special Issue Advances in Biocompatible and Biodegradable Polymers, 4th Edition)
Show Figures

Figure 1

Figure 1
<p>SEM micrographs of prepared biochar after pyrolysis at 550 and 700 °C and grinding in low (left) and high (right) magnification. Figures (<b>a</b>,<b>b</b>) depict biochar pyrolyzed at 550 °C, while figures (<b>c</b>,<b>d</b>) depict biochar pyrolyzed at 700 °C.</p>
Full article ">Figure 2
<p>(<b>a</b>) <sup>1</sup>H NMR of PLA/SWP550, (<b>b</b>) <sup>1</sup>H NMR of PLA/SWP700, (<b>c</b>) <sup>13</sup>C NMR of PLA/SWP550, and (<b>d</b>) <sup>13</sup>C NMR of PLA/SWP700.</p>
Full article ">Figure 2 Cont.
<p>(<b>a</b>) <sup>1</sup>H NMR of PLA/SWP550, (<b>b</b>) <sup>1</sup>H NMR of PLA/SWP700, (<b>c</b>) <sup>13</sup>C NMR of PLA/SWP550, and (<b>d</b>) <sup>13</sup>C NMR of PLA/SWP700.</p>
Full article ">Figure 3
<p>FT-IR spectra of biochar pyrolyzed at 550 °C and 700 °C.</p>
Full article ">Figure 4
<p>FT-IR spectra of neat PLA and its bio-composites with biochar pyrolyzed at (<b>a</b>) 550 °C and (<b>b</b>) 700 °C. Overlay of corresponding carbonyl peaks (<b>c</b>) for PLA/SWP550 bio-composites and (<b>d</b>) PLA/SWP700 bio-composites. The blue arrows mark the minor shift of bio-composite spectra toward lower wavenumbers.</p>
Full article ">Figure 5
<p>TEM micrographs of PLA/BC bio-composites with (<b>a</b>) 1 wt% biochar, (<b>b</b>) 2.5 wt% biochar, and (<b>c</b>) 5 wt% biochar.</p>
Full article ">Figure 6
<p>XRD patterns of neat PLA and its bio-composites at different biochar loadings: (<b>a</b>) with biochar at 550 °C, (<b>b</b>) with biochar at 700 °C.</p>
Full article ">Figure 7
<p>Comparative DSC traces during (<b>a</b>) the heating of scan 1 and (<b>b</b>,<b>c</b>) the cooling and heating of scan 2. The heat flow is shown upon normalization to the sample mass. The added arrows mark effects imposed by the filler addition.</p>
Full article ">Figure 8
<p>Comparative DRS results of ε″ in the form of ((<b>a</b>), raw data) isothermal curves at 60 °C and ((<b>b</b>), replotting) isochronal curves at f~3 kHz. Indicated are the main relaxation processes recorded. The added arrows mark the effects arising from the filler addition.</p>
Full article ">Figure 9
<p>Examples of fitting of the ε″(f) spectra for the described samples [(<b>a</b>) neat PLA and (<b>b</b>) PLA + 1.0% SWP550] and temperatures, are given details in the text.</p>
Full article ">Figure 10
<p>(<b>a</b>) Dielectric relaxation map in terms of time scale for all samples, described on the plot. The straight and curved lines connecting the experimental points are, respectively, fittings of the Arrhenius and Vogel–Tammann–Fulcher–Hesse equations. (<b>b</b>) The estimated dielectric T<sub>g</sub> (left axis) and fragility index (right axis), from α relaxation, for the various samples.</p>
Full article ">Figure 11
<p>Mass loss vs. time plot during enzymatic hydrolysis of neat PLA and PLA/BC bio-composites, (<b>a</b>) with biochar at 550 °C, (<b>b</b>) with biochar at 700 °C.</p>
Full article ">Figure 12
<p>SEM micrographs of PLA and its bio-composites: (<b>a</b>) with biochar at 550 °C, (<b>b</b>) with biochar at 700 °C throughout enzymatic hydrolysis (10, 20, and 30 days).</p>
Full article ">Figure 13
<p>TGA thermograms and dTG curves of (<b>a</b>,<b>c</b>) PLA_SWP550 and (<b>b</b>,<b>d</b>) PLA_SWP700 at a heating rate of 20 °C/min under nitrogen flow.</p>
Full article ">Figure 13 Cont.
<p>TGA thermograms and dTG curves of (<b>a</b>,<b>c</b>) PLA_SWP550 and (<b>b</b>,<b>d</b>) PLA_SWP700 at a heating rate of 20 °C/min under nitrogen flow.</p>
Full article ">Figure 14
<p>The dependence of activation energy (E<sub>α</sub>) on the degree of conversion (α) for the thermal degradation of PLA/SWP550 and PLA/SWP700 composites as calculated by (<b>a</b>) Friedman method and (<b>b</b>) Vyazovkin analysis.</p>
Full article ">Figure 15
<p>Mass (%) curves for selected (<b>a</b>) PLA/SWP550 2.5 wt% and (<b>b</b>) PLA/SWP700 2.5 wt% at heating rates of 5, 10, 15, and 20 °C/min in a nitrogen atmosphere (symbols) and corresponding fitted curves using the combination of Cn-Cn-Cn reaction models (Solid lines).</p>
Full article ">Scheme 1
<p>Numbered structure of the prepared PLA and PLA/BC bio-composites.</p>
Full article ">
21 pages, 1176 KiB  
Article
A Sparse Feature-Based Mixed Signal Frequencies Detecting for Unmanned Aerial Vehicle Communications
by Yang Wang, Yongxin Feng, Fan Zhou, Xi Chen, Jian Wang and Peiying Zhang
Drones 2025, 9(1), 34; https://doi.org/10.3390/drones9010034 - 6 Jan 2025
Viewed by 633
Abstract
As drone technology develops rapidly and many users emerge in airspace networks, various forms of interference have caused the wireless spectrum to exhibit a dense, diverse, and dynamic trend. This increases the probability of spectrum conflicts among users and seriously impacts the quality [...] Read more.
As drone technology develops rapidly and many users emerge in airspace networks, various forms of interference have caused the wireless spectrum to exhibit a dense, diverse, and dynamic trend. This increases the probability of spectrum conflicts among users and seriously impacts the quality and transmission rate of communication. How to effectively improve the detection accuracy of each frequency component in the electromagnetic space mixed signals and avoid spectrum conflicts will become one of the crucial issues currently faced by unmanned aerial vehicle (UAV) communication technologies. However, the existing methods overlook the mutual interference among the component signals as well as the noise during the frequency detection process, which affects their detection performance. In this paper, we propose a mixed-signal frequency detection method based on the reconstruction of sparse feature signals. Without information such as frequency range, bandwidth, and the number of components, it can utilize the autoencoder network to learn the sparse features of each component signal in the high-dimensional frequency domain space and construct a nonlinear reconstruction function to reconstruct each component signal in the mixed signal, thereby realizing the separation of signals. On this basis, complex dilated convolution and deconvolution are used successively to perform feature extraction on the separated signals, which enhances the receptive field and frequency resolution ability of the network for signals, reduces the interference between noise and different component signals, and realizes the accurate estimation of the number of components and carrier frequencies. The simulation results show that when SNR 6 dB, the detection accuracy of the number of component signals is greater than 96.3%. The detection error and detection accuracy of component frequencies are less than 3.19% and greater than 90.7%, respectively. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of drone application scenarios.</p>
Full article ">Figure 2
<p>Frequency detection flow based on sparse feature signal reconstruction.</p>
Full article ">Figure 3
<p>Signal separation network structure design.</p>
Full article ">Figure 4
<p>Component number detection network structure design.</p>
Full article ">Figure 5
<p>Component frequency detection network structure design.</p>
Full article ">Figure 6
<p>Signal separation error of SFsRNet method.</p>
Full article ">Figure 7
<p>Comparison of the Time Domain Characteristics Between Separated and Original Sub-Signals. Panels (<b>a</b>–<b>d</b>) illustrate the separation results of individual component signals from the mixed-signal. Each component signal exhibits distinct amplitude, phase, and frequency characteristics. The blue right triangle denotes the original signal, while the yellow upward triangle and the red circle represent the separation results under signal-to-noise ratios (SNR) of 0 dB and 10 dB, respectively.</p>
Full article ">Figure 8
<p>Comparison of component number detection accuracy.</p>
Full article ">Figure 9
<p>Comparison of component frequency detection error.</p>
Full article ">Figure 10
<p>Comparison of frequency detection error with different number of components. (<b>a</b>) Frequency detection error value when <span class="html-italic">m</span> = 2. (<b>b</b>) Frequency detection error value when <span class="html-italic">m</span> = 3. (<b>c</b>) Frequency detection error value when <span class="html-italic">m</span> = 3. (<b>d</b>) Frequency detection error value when <span class="html-italic">m</span> = 3.</p>
Full article ">Figure 11
<p>Comparison of component frequency detection accuracy (<math display="inline"><semantics> <mrow> <mi>ε</mi> <mo>=</mo> <mn>0.02</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 12
<p>Comparison of component frequency detection accuracy (<math display="inline"><semantics> <mrow> <mi>ε</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 13
<p>Comparison of frequency detection accuracy with different number of components (<math display="inline"><semantics> <mrow> <mi>ε</mi> <mo>=</mo> <mn>0.02</mn> </mrow> </semantics></math>). (<b>a</b>) Frequency detection accuracy value when <span class="html-italic">m</span> = 2. (<b>b</b>) Frequency detection accuracy value when <span class="html-italic">m</span> = 3. (<b>c</b>) Frequency detection accuracy value when <span class="html-italic">m</span> = 3. (<b>d</b>) Frequency detection accuracy value when <span class="html-italic">m</span> = 3.</p>
Full article ">
17 pages, 2752 KiB  
Article
Fountain Coding Based Two-Way Relaying Cognitive Radio Networks Employing Reconfigurable Intelligent Surface and Energy Harvesting
by Hieu T. Nguyen, Nguyen-Thi Hau, Nguyen Van Toan, Vo Ta Ty and Tran Trung Duy
Telecom 2025, 6(1), 1; https://doi.org/10.3390/telecom6010001 - 25 Dec 2024
Viewed by 574
Abstract
This paper examines two-way relaying cognitive radio networks utilizing fountain coding (FC), reconfigurable intelligent surfaces (RIS), and radio frequency energy harvesting (EH). In the proposed schemes, two secondary sources attempt to exchange data with each other through the assistance of an RIS deployed [...] Read more.
This paper examines two-way relaying cognitive radio networks utilizing fountain coding (FC), reconfigurable intelligent surfaces (RIS), and radio frequency energy harvesting (EH). In the proposed schemes, two secondary sources attempt to exchange data with each other through the assistance of an RIS deployed in the network. Using FC, one source sends its encoded packets to the other source, which must collect enough packets for a successful data recovery. The transmit power of the two sources is adjusted according to an interference constraint given by a primary user and the energy harvested from a power station. In the conventional scheme, one source continuously transmits FC packets to the other, using the maximum number of transmissions allowed. In the modified scheme, as soon as one source collects a sufficient number of FC packets, it notifies the other source to stop transmission. We derive closed-form expressions of outage probability (OP) at each source, system outage probability (SOP), and average number of FC-packet transmissions for the successful data exchange of the considered schemes over Rayleigh fading channels. Simulation results are provided to validate our analysis, to compare the performance of the considered schemes, and to examine the impact of key parameters on performance. Full article
(This article belongs to the Special Issue Performance Criteria for Advanced Wireless Communications)
Show Figures

Figure 1

Figure 1
<p>The proposed FC-based TWR CR scheme.</p>
Full article ">Figure 2
<p><math display="inline"><semantics> <mrow> <msub> <mi mathvariant="sans-serif">Φ</mi> <mi>i</mi> </msub> </mrow> </semantics></math> as a function of <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <mfenced> <mrow> <mi>dB</mi> </mrow> </mfenced> </mrow> </semantics></math> with <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mrow> <mi>SB</mi> </mrow> </msub> <mo>=</mo> <mn>0.7</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.35</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p><math display="inline"><semantics> <mrow> <msub> <mi mathvariant="sans-serif">Φ</mi> <mi>i</mi> </msub> </mrow> </semantics></math> as a function of <math display="inline"><semantics> <mi>α</mi> </semantics></math> with <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <mo>=</mo> <mn>15</mn> <mtext> </mtext> <mfenced> <mrow> <mi>dB</mi> </mrow> </mfenced> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>OP of the <math display="inline"><semantics> <mrow> <mrow> <mi>Cov-Scm</mi> </mrow> </mrow> </semantics></math> scheme as a function of <math display="inline"><semantics> <mi mathvariant="sans-serif">Δ</mi> </semantics></math> (dB) when <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mrow> <mi>SB</mi> </mrow> </msub> <mo>=</mo> <mn>0.35</mn> <mo>,</mo> </mrow> </semantics></math> <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mrow> <mi>max</mi> </mrow> </msub> <mo>=</mo> <mn>6</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>OP of the <math display="inline"><semantics> <mrow> <mrow> <mi>Mod-Scm</mi> </mrow> </mrow> </semantics></math> scheme as a function of <math display="inline"><semantics> <mi mathvariant="sans-serif">Δ</mi> </semantics></math> (dB) when <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mrow> <mi>SB</mi> </mrow> </msub> <mo>=</mo> <mn>0.35</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.5</mn> <mo>,</mo> </mrow> </semantics></math> <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mrow> <mi>max</mi> </mrow> </msub> <mo>=</mo> <mn>6</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>SOP as a function of <math display="inline"><semantics> <mi mathvariant="sans-serif">Δ</mi> </semantics></math> (dB) when <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mrow> <mi>SB</mi> </mrow> </msub> <mo>=</mo> <mn>0.35</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.5</mn> <mo>,</mo> </mrow> </semantics></math> <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mrow> <mi>max</mi> </mrow> </msub> <mo>=</mo> <mn>6</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>OP and <math display="inline"><semantics> <mrow> <mi>SOP</mi> </mrow> </semantics></math> as a function of <math display="inline"><semantics> <mi>α</mi> </semantics></math> when <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <mo>=</mo> </mrow> </semantics></math>8.5 dB, <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mrow> <mi>SB</mi> </mrow> </msub> <mo>=</mo> <mn>0.65</mn> <mo>,</mo> </mrow> </semantics></math><math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mrow> <mi>max</mi> </mrow> </msub> <mo>=</mo> <mn>7</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p>OP and <math display="inline"><semantics> <mrow> <mi>SOP</mi> </mrow> </semantics></math> as a function of <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mrow> <mi>SB</mi> </mrow> </msub> </mrow> </semantics></math> when <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <mo>=</mo> </mrow> </semantics></math>11 dB, <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.375</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mrow> <mi>max</mi> </mrow> </msub> <mo>=</mo> <mn>6</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 9
<p>The average number of transmissions for the successful data exchange as a function of <math display="inline"><semantics> <mi mathvariant="sans-serif">Δ</mi> </semantics></math> (dB) when <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mrow> <mi>SB</mi> </mrow> </msub> <mo>=</mo> <mn>0.4</mn> <mo>,</mo> </mrow> </semantics></math> <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mrow> <mi>max</mi> </mrow> </msub> <mo>=</mo> <mn>7</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 10
<p>The average number of transmissions for the successful data exchange as a function of <math display="inline"><semantics> <mi>α</mi> </semantics></math> when <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <mo>=</mo> <mn>8.5</mn> </mrow> </semantics></math> dB, <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mrow> <mi>max</mi> </mrow> </msub> <mo>=</mo> <mn>7</mn> </mrow> </semantics></math>.</p>
Full article ">
12 pages, 592 KiB  
Article
Unmanned-Aerial-Vehicle-Assisted Secure Free Space Optical Transmission in Internet of Things: Intelligent Strategy for Optimal Fairness
by Fang Xu and Mingda Dong
Sensors 2024, 24(24), 8070; https://doi.org/10.3390/s24248070 - 18 Dec 2024
Viewed by 515
Abstract
In this article, we consider an UAV (unmanned aerial vehicle)-assisted free space optical (FSO) secure communication network. Since FSO signal is impossible to detect by eavesdroppers without proper beam alignment and security authentication, a BS employs FSO technique to transfer information to multiple [...] Read more.
In this article, we consider an UAV (unmanned aerial vehicle)-assisted free space optical (FSO) secure communication network. Since FSO signal is impossible to detect by eavesdroppers without proper beam alignment and security authentication, a BS employs FSO technique to transfer information to multiple authenticated sensors, to improve the transmission security and reliability with the help of an UAV relay with decode and forward (DF) mode. All the sensors need to first send information to the UAV to obtain security authentication, and then the UAV forwards corresponding information to them. Successive interference cancellation (SIC) is used to decode the information received at the UAV and all authenticated sensors. With consideration of fairness, we introduce a statistical metric for evaluating the network performance, i.e., the maximum decoding outage probability for all authenticated sensors. In particular, applying an intelligent approach, we obtain a near-optimal scheme for secure transmit power allocation. With a well-trained allocation scheme, approximate closed-form expressions for optimal transmit power levels can be obtained. Through some numerical examples, we illustrate the various design trade-offs for such a system. Additionally, the validity of our approach was verified by comparing with the result from exhaustive search. In particular, the result with DRL was only 0.3% higher than that with exhaustive search. These results can provide some important guidelines for the fairness-aware design of UAV-assisted secure FSO communication networks. Full article
(This article belongs to the Special Issue Advances in Security for Emerging Intelligent Systems)
Show Figures

Figure 1

Figure 1
<p>Configuration of UAV-assisted FSO communication network.</p>
Full article ">Figure 2
<p>The configuration of the employed deep neural networks.</p>
Full article ">Figure 3
<p>The minimum value for the maximum outage probability for the exhaustive search and deep reinforcement learning, <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mrow> <mi>S</mi> <mi>R</mi> </mrow> </msub> <mo>=</mo> <mn>13</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mrow> <mi>S</mi> <mi>R</mi> </mrow> </msub> <mo>=</mo> <mn>0.4</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <msub> <mi>α</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>1</mn> </mrow> </msub> </semantics></math><math display="inline"><semantics> <mrow> <mspace width="3.33333pt"/> <mo>=</mo> <mn>13</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>1</mn> </mrow> </msub> <mo>=</mo> <mn>7.5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>1</mn> </mrow> </msub> <mo>=</mo> <mn>1.7</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mn>13.5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mn>8</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mn>2.1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <msub> <mi>α</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>3</mn> </mrow> </msub> </semantics></math><math display="inline"><semantics> <mrow> <mspace width="3.33333pt"/> <mo>=</mo> <mn>11.5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>3</mn> </mrow> </msub> <mo>=</mo> <mn>7.2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>3</mn> </mrow> </msub> <mo>=</mo> <mn>2.4</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Near-optimal statistical transmit power levels for the signals of all machines, <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mrow> <mi>S</mi> <mi>R</mi> </mrow> </msub> <mo>=</mo> <mn>13</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mrow> <mi>S</mi> <mi>R</mi> </mrow> </msub> <mo>=</mo> <mn>0.4</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <msub> <mi>α</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>1</mn> </mrow> </msub> </semantics></math><math display="inline"><semantics> <mrow> <mspace width="3.33333pt"/> <mo>=</mo> <mn>13</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>1</mn> </mrow> </msub> <mo>=</mo> <mn>7.5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>1</mn> </mrow> </msub> <mo>=</mo> <mn>1.7</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mn>13.5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mn>8</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mn>2.1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <msub> <mi>α</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>3</mn> </mrow> </msub> </semantics></math><math display="inline"><semantics> <mrow> <mspace width="3.33333pt"/> <mo>=</mo> <mn>11.5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>3</mn> </mrow> </msub> <mo>=</mo> <mn>7.2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mrow> <mi>R</mi> <mi>D</mi> <mn>3</mn> </mrow> </msub> <mo>=</mo> <mn>2.4</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>The average reward over 100 consecutive steps for the training of the statistical optimal scheme.</p>
Full article ">
13 pages, 548 KiB  
Article
Age of Information Analysis for Multi-Priority Queue and Non-Orthoganal Multiple Access (NOMA)-Enabled Cellular Vehicle-to-Everything in Internet of Vehicles
by Zheng Zhang, Qiong Wu, Pingyi Fan and Qiang Fan
Sensors 2024, 24(24), 7966; https://doi.org/10.3390/s24247966 - 13 Dec 2024
Viewed by 694
Abstract
With the development of Internet of Vehicles (IoV) technology, the need for real-time data processing and communication in vehicles is increasing. Traditional request-based methods face challenges in terms of latency and bandwidth limitations. Mode 4 in cellular vehicle-to-everything (C-V2X), also known as autonomous [...] Read more.
With the development of Internet of Vehicles (IoV) technology, the need for real-time data processing and communication in vehicles is increasing. Traditional request-based methods face challenges in terms of latency and bandwidth limitations. Mode 4 in cellular vehicle-to-everything (C-V2X), also known as autonomous resource selection, aims to address latency and overhead issues by dynamically selecting communication resources based on real-time conditions. However, semi-persistent scheduling (SPS), which relies on distributed sensing, may lead to a high number of collisions due to the lack of centralized coordination in resource allocation. On the other hand, non-orthogonal multiple access (NOMA) can alleviate the problem of reduced packet reception probability due to collisions. Age of Information (AoI) includes the time a message spends in both local waiting and transmission processes and thus is a comprehensive metric for reliability and latency performance. To address these issues, in C-V2X, the waiting process can be extended to the queuing process, influenced by packet generation rate and resource reservation interval (RRI), while the transmission process is mainly affected by transmission delay and success rate. In fact, a smaller selection window (SW) limits the number of available resources for vehicles, resulting in higher collisions when the number of vehicles is increasing rapidly. SW is generally equal to RRI, which not only affects the AoI part in the queuing process but also the AoI part in the transmission process. Therefore, this paper proposes an AoI estimation method based on multi-priority data type queues and considers the influence of NOMA on the AoI generated in both processes in C-V2X system under different RRI conditions. Our experiments show that using multiple priority queues can reduce the AoI of urgent messages in the queue, thereby providing better service about the urgent message in the whole vehicular network. Additionally, applying NOMA can further reduce the AoI of the messages received by the vehicle. Full article
Show Figures

Figure 1

Figure 1
<p>System model.</p>
Full article ">Figure 2
<p>AvgAoI in different queues.</p>
Full article ">Figure 3
<p>AvgAoI in queues.</p>
Full article ">Figure 4
<p><math display="inline"><semantics> <msub> <mi>N</mi> <mi>v</mi> </msub> </semantics></math> = 30.</p>
Full article ">Figure 5
<p><math display="inline"><semantics> <msub> <mi>N</mi> <mi>v</mi> </msub> </semantics></math> = 50.</p>
Full article ">
20 pages, 889 KiB  
Article
Slotted ALOHA Based Practical Byzantine Fault Tolerance (PBFT) Blockchain Networks: Performance Analysis and Optimization
by Ziyi Zhou, Oluwakayode Onireti, Lei Zhang and Muhammad Ali Imran
Sensors 2024, 24(23), 7688; https://doi.org/10.3390/s24237688 - 30 Nov 2024
Viewed by 760
Abstract
Practical Byzantine Fault Tolerance (PBFT) is one of the most popular consensus mechanisms for the consortium and private blockchain technology. It has been recognized as a candidate consensus mechanism for the Internet of Things networks as it offers lower resource requirements and high [...] Read more.
Practical Byzantine Fault Tolerance (PBFT) is one of the most popular consensus mechanisms for the consortium and private blockchain technology. It has been recognized as a candidate consensus mechanism for the Internet of Things networks as it offers lower resource requirements and high performance when compared with other consensus mechanisms such as proof of work. In this paper, by considering the blockchain nodes are wirelessly connected, we model the network nodes distribution and transaction arrival rate as Poisson point process and we develop a framework for evaluating the performance of the wireless PBFT network. The framework utilizes slotted ALOHA as its multiple access technique. We derive the end-to-end success probability of the wireless PBFT network which serves as the basis for obtaining other key performance indicators namely, the optimal transmission interval, the transaction throughput and delay, and the viable area. The viable area represents the minimum PBFT coverage area that guarantees the liveness, safety, and resilience of the PBFT protocol while satisfying a predefined end-to-end success probability. Results show that the transmission interval required to make the wireless PBFT network viable can be reduced if either the end-to-end success probability requirement or the number of faulty nodes is lowered. Full article
Show Figures

Figure 1

Figure 1
<p>Normal case operation of the Practical Byzantine Fault Tolerance (PBFT) network [<a href="#B14-sensors-24-07688" class="html-bibr">14</a>].</p>
Full article ">Figure 2
<p>Spatial distribution of the Practical Byzantine Fault Tolerance (PBFT) network.</p>
Full article ">Figure 3
<p>Illustration of channel contention in wireless PBFT.</p>
Full article ">Figure 4
<p>End-to-end success probability <math display="inline"><semantics> <msub> <mi mathvariant="script">P</mi> <mi>s</mi> </msub> </semantics></math> plotted against the transmission interval for the prepare and commit phases <math display="inline"><semantics> <mrow> <msub> <mi>v</mi> <mi>p</mi> </msub> <mo>=</mo> <msub> <mi>v</mi> <mi>c</mi> </msub> <mo>=</mo> <mi>v</mi> </mrow> </semantics></math>).</p>
Full article ">Figure 5
<p>Effect of increasing the number of nodes <span class="html-italic">n</span> and the transmission interval <span class="html-italic">v</span> on end-to-end success probability.</p>
Full article ">Figure 6
<p>End-to-end transaction throughput of wireless PBFT network.</p>
Full article ">Figure 7
<p>Effect of increasing the number of node <span class="html-italic">n</span> for <math display="inline"><semantics> <mrow> <mi>f</mi> <mo>=</mo> <mo>⌊</mo> <mstyle displaystyle="true"> <mfrac> <mrow> <mi>n</mi> <mo>−</mo> <mn>1</mn> </mrow> <mn>3</mn> </mfrac> </mstyle> <mo>⌋</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p>Effect of the view change on the PBFT confirmation delay.</p>
Full article ">Figure 9
<p>Viable area of PBFT consensus network expressed as a function of the number of nodes <span class="html-italic">n</span>.</p>
Full article ">
22 pages, 8720 KiB  
Article
Structure Design and Reliable Acquisition of Burst Spread Spectrum Signals Without Physical Layer Synchronization Overhead
by Shenfu Pan, Leyu Yin, Yunhua Tan and Yan Wang
Electronics 2024, 13(23), 4586; https://doi.org/10.3390/electronics13234586 - 21 Nov 2024
Viewed by 516
Abstract
In order to improve the concealment and security of a point-to-point transparent forwarding satellite communication system, a signal structure based on aperiodic long code spread spectrum is designed in this paper. This structure can achieve reliable signal acquisition without special physical layer synchronization [...] Read more.
In order to improve the concealment and security of a point-to-point transparent forwarding satellite communication system, a signal structure based on aperiodic long code spread spectrum is designed in this paper. This structure can achieve reliable signal acquisition without special physical layer synchronization overhead, which can effectively shorten signal transmission time and improve the concealment of communication. In addition, the performance of burst spread spectrum signal acquisition is analyzed in detail by establishing a mathematical model, and the influencing factors and design criteria of the matching filter length for aperiodic long code acquisition are determined. On this basis, a matched filter acquisition method based on high-power clock multiplexing and an adaptive decision threshold design method based on an auxiliary channel are proposed. The above methods effectively reduce hardware complexity and resource consumption caused by long code acquisition, and realize reliable acquisition under the condition of low SNR. The simulation results show that under the condition of Eb/N0 = 3 dB, the transmission efficiency for a 128-symbol burst frame can be increased by 50%, thereby significantly reducing the burst communication time. Furthermore, the acquisition success probability can reach 99.99%. Full article
Show Figures

Figure 1

Figure 1
<p>Satellite communication scenario.</p>
Full article ">Figure 2
<p>Physical layer frame structure of a typical burst spread spectrum signal.</p>
Full article ">Figure 3
<p>The processing flow of burst spread spectrum signal based on synchronous overhead.</p>
Full article ">Figure 4
<p>Processing flow of aperiodic long code signal sender without synchronization overhead.</p>
Full article ">Figure 5
<p>Block diagram of the receiver of burst spread spectrum signal.</p>
Full article ">Figure 6
<p>Block diagram of spread spectrum code acquisition based on matched filter.</p>
Full article ">Figure 7
<p>Signal acquisition decision diagram.</p>
Full article ">Figure 8
<p>The relationship between the maximum value of <math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mrow> <mi>a</mi> <mi>c</mi> <mi>q</mi> </mrow> </msub> </mrow> </semantics></math> and <math display="inline"><semantics> <mi>L</mi> </semantics></math>.</p>
Full article ">Figure 9
<p>Comparison of non-multiplexed and multiplexed long code matched filters.</p>
Full article ">Figure 10
<p>Acquisition algorithm based on adaptive threshold decision.</p>
Full article ">Figure 11
<p>The relationship between <math display="inline"><semantics> <mi>λ</mi> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mrow> <mi>a</mi> <mi>c</mi> <mi>q</mi> </mrow> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 12
<p>Acquisition threshold estimation error <math display="inline"><semantics> <mrow> <mo>Δ</mo> <mi>V</mi> </mrow> </semantics></math> diagram.</p>
Full article ">Figure 13
<p><math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mrow> <mi>a</mi> <mi>c</mi> <mi>q</mi> </mrow> </msub> </mrow> </semantics></math> of different <span class="html-italic">L</span> and different SNR varying with <math display="inline"><semantics> <mi>λ</mi> </semantics></math>.</p>
Full article ">Figure 14
<p>Comparison of theoretical curve and Monte Carlo simulation curve.</p>
Full article ">Figure 15
<p>The maximum and minimum normalized thresholds when the target acquisition success probability <math display="inline"><semantics> <mi>γ</mi> </semantics></math> is 0.9999.</p>
Full article ">Figure 16
<p>Acquisition simulation diagram when Eb/N0 = 3 dB, L = 128.</p>
Full article ">Figure 17
<p>A successful acquisition of the Monte Carlo simulation.</p>
Full article ">
20 pages, 3578 KiB  
Article
TOAR: Toward Resisting AS-Level Adversary Correlation Attacks Optimal Anonymous Routing
by Hui Zhao and Xiangmei Song
Mathematics 2024, 12(23), 3640; https://doi.org/10.3390/math12233640 - 21 Nov 2024
Viewed by 581
Abstract
The Onion Router (Tor), as the most widely used anonymous network, is vulnerable to traffic correlation attacks by powerful passive adversaries, such as Autonomous Systems (AS). AS-level adversaries increase their chances of executing correlation attacks by manipulating the underlying routing, thereby compromising anonymity. [...] Read more.
The Onion Router (Tor), as the most widely used anonymous network, is vulnerable to traffic correlation attacks by powerful passive adversaries, such as Autonomous Systems (AS). AS-level adversaries increase their chances of executing correlation attacks by manipulating the underlying routing, thereby compromising anonymity. Furthermore, these underlying routing detours in the Tor client’s routing inference introduce extra latency. To address this challenge, we propose Toward Resisting AS-level Adversary Correlation Attacks Optimal Anonymous Routing (TOAR). TOAR is a two-stage routing mechanism based on Bayesian optimization within Software Defined Networks (SDN), comprising route search and route forwarding. Specifically, it searches for routes that conform to established policies, avoiding AS that could connect traffic between clients and destinations while maintaining anonymity in the selection of routes that minimize communication costs. To evaluate the anonymity of TOAR, as well as the effectiveness of route searching and the performance of route forwarding, we conduct a detailed analysis and extensive experiments. The analysis and experimental results show that the probability of routing being compromised by correlation attacks is significantly reduced. Compared to classical enumeration-based methods, the success rate of route searching increased by close to 2.5 times, and the forwarding throughput reached 70% of that of the packet transmission. The results show that TOAR effectively improves anonymity while maintaining communication quality, minimizing anonymity loss from AS-level adversaries and reducing high latency from routing detours. Full article
Show Figures

Figure 1

Figure 1
<p>Scenarios of traffic correlation attacks by a single AS-level adversary.</p>
Full article ">Figure 2
<p>System model schematic.</p>
Full article ">Figure 3
<p>Instance of the optimal AS routing problem with policy constraints.</p>
Full article ">Figure 4
<p>Software defined inter-domain programmable interface.</p>
Full article ">Figure 5
<p>Process of route negotiation and route confirmation.</p>
Full article ">Figure 6
<p>Impact of path length <math display="inline"><semantics> <mrow> <mi>n</mi> </mrow> </semantics></math> on the probability <math display="inline"><semantics> <mrow> <mi>d</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>Trend of security policy function <math display="inline"><semantics> <mrow> <mi>d</mi> <mo>(</mo> <mi>p</mi> <mo>,</mo> <mi>k</mi> <mo>,</mo> <mi>m</mi> <mo>,</mo> <mi>n</mi> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p>The <math display="inline"><semantics> <mrow> <mo>∆</mo> <mi>C</mi> </mrow> </semantics></math> statistic of the results.</p>
Full article ">Figure 9
<p>Percentage of search effectiveness.</p>
Full article ">Figure 10
<p>SDN experiment environment.</p>
Full article ">Figure 11
<p>Impact of data size changed on throughput.</p>
Full article ">Figure 12
<p>Communication latency.</p>
Full article ">Figure 13
<p>Throughput of route forwarding.</p>
Full article ">
25 pages, 1006 KiB  
Article
Statistics of the Sum of Double Random Variables and Their Applications in Performance Analysis and Optimization of Simultaneously Transmitting and Reflecting Reconfigurable Intelligent Surface-Assisted Non-Orthogonal Multi-Access Systems
by Bui Vu Minh, Phuong T. Tran, Thu-Ha Thi Pham, Anh-Tu Le, Si-Phu Le and Pavol Partila
Sensors 2024, 24(18), 6148; https://doi.org/10.3390/s24186148 - 23 Sep 2024
Cited by 1 | Viewed by 931
Abstract
For the future of sixth-generation (6G) wireless communication, simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) technology is emerging as a promising solution to achieve lower power transmission and flawless coverage. To facilitate the performance analysis of RIS-assisted networks, the statistics of the [...] Read more.
For the future of sixth-generation (6G) wireless communication, simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) technology is emerging as a promising solution to achieve lower power transmission and flawless coverage. To facilitate the performance analysis of RIS-assisted networks, the statistics of the sum of double random variables, i.e., the sum of the products of two random variables of the same distribution type, become vitally necessary. This paper applies the statistics of the sum of double random variables in the performance analysis of an integrated power beacon (PB) energy-harvesting (EH)-based NOMA-assisted STAR-RIS network to improve its outage probability (OP), ergodic rate, and average symbol error rate. Furthermore, the impact of imperfect successive interference cancellation (ipSIC) on system performance is also analyzed. The analysis provides the closed-form expressions of the OP and ergodic rate derived for both imperfect and perfect SIC (pSIC) cases. All analyses are supported by extensive simulation results, which help recommend optimized system parameters, including the time-switching factor, the number of reflecting elements, and the power allocation coefficients, to minimize the OP. Finally, the results demonstrate the superiority of the proposed framework compared to conventional NOMA and OMA systems. Full article
(This article belongs to the Special Issue 5G/6G Networks for Wireless Communication and IoT)
Show Figures

Figure 1

Figure 1
<p>STAR-RIS-assisted NOMA system.</p>
Full article ">Figure 2
<p>PDF and CDF for different numbers of STAR-RIS elements (<math display="inline"><semantics> <mrow> <mi>Q</mi> <mo>=</mo> <mn>8</mn> <mo>,</mo> <mn>12</mn> <mo>,</mo> <mn>16</mn> </mrow> </semantics></math>), with <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>Comparison of OPs in a classic channel with varying numbers of STAR-RIS elements <math display="inline"><semantics> <mrow> <mi>Q</mi> <mo>=</mo> <mn>16</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>OPs of two users versus <math display="inline"><semantics> <mi>ρ</mi> </semantics></math> with varying numbers of STAR-RIS elements <math display="inline"><semantics> <mrow> <mi>Q</mi> <mo>=</mo> <mn>8</mn> <mo>,</mo> <mn>32</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>OP versus the target rates with <math display="inline"><semantics> <mrow> <mi>Q</mi> <mo>=</mo> <mn>16</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.9</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>0.1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mo>ℓ</mo> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>ρ</mi> <mo>=</mo> <mn>11</mn> </mrow> </semantics></math> dB.</p>
Full article ">Figure 6
<p>OP versus <math display="inline"><semantics> <msub> <mi>a</mi> <mn>2</mn> </msub> </semantics></math> with <math display="inline"><semantics> <mrow> <mo>ℓ</mo> <mo>=</mo> <mn>0.05</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>ρ</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> dB.</p>
Full article ">Figure 7
<p>OP of the destination versus <math display="inline"><semantics> <mi>α</mi> </semantics></math> with <math display="inline"><semantics> <mrow> <mo>ℓ</mo> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.9</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>0.1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>ρ</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> dB.</p>
Full article ">Figure 8
<p>OP of the STAR-RIS-aided NOMA: Relay networks versus <math display="inline"><semantics> <mi>ρ</mi> </semantics></math> with <math display="inline"><semantics> <mrow> <mo>ℓ</mo> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>Q</mi> <mo>=</mo> <mn>8</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 9
<p>Ergodic rate versus <math display="inline"><semantics> <mi>ρ</mi> </semantics></math> with <math display="inline"><semantics> <mrow> <mo>ℓ</mo> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 10
<p>Ergodic rate versus <span class="html-italic">Q</span> with <math display="inline"><semantics> <mrow> <mo>ℓ</mo> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>ρ</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math> dB.</p>
Full article ">Figure 11
<p>The average SERs of the considered STAR-RIS assisted NOMA system versus <math display="inline"><semantics> <mi>ρ</mi> </semantics></math> for BPSK and 4QAM modulations with <math display="inline"><semantics> <mrow> <mo>ℓ</mo> <mo>=</mo> <mn>0.05</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>a</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>Q</mi> <mo>=</mo> <mn>8</mn> </mrow> </semantics></math>.</p>
Full article ">
19 pages, 1523 KiB  
Article
Increasing Population Immunity Prior to Globally-Coordinated Cessation of Bivalent Oral Poliovirus Vaccine (bOPV)
by Nima D. Badizadegan, Steven G. F. Wassilak, Concepción F. Estívariz, Eric Wiesen, Cara C. Burns, Omotayo Bolu and Kimberly M. Thompson
Pathogens 2024, 13(9), 804; https://doi.org/10.3390/pathogens13090804 - 17 Sep 2024
Cited by 1 | Viewed by 1147
Abstract
In 2022, global poliovirus modeling suggested that coordinated cessation of bivalent oral poliovirus vaccine (bOPV, containing Sabin-strain types 1 and 3) in 2027 would likely increase the risks of outbreaks and expected paralytic cases caused by circulating vaccine-derived polioviruses (cVDPVs), particularly type 1. [...] Read more.
In 2022, global poliovirus modeling suggested that coordinated cessation of bivalent oral poliovirus vaccine (bOPV, containing Sabin-strain types 1 and 3) in 2027 would likely increase the risks of outbreaks and expected paralytic cases caused by circulating vaccine-derived polioviruses (cVDPVs), particularly type 1. The analysis did not include the implementation of planned, preventive supplemental immunization activities (pSIAs) with bOPV to achieve and maintain higher population immunity for types 1 and 3 prior to bOPV cessation. We reviewed prior published OPV cessation modeling studies to support bOPV cessation planning. We applied an integrated global poliovirus transmission and OPV evolution model after updating assumptions to reflect the epidemiology, immunization, and polio eradication plans through the end of 2023. We explored the effects of bOPV cessation in 2027 with and without additional bOPV pSIAs prior to 2027. Increasing population immunity for types 1 and 3 with bOPV pSIAs (i.e., intensification) could substantially reduce the expected global risks of experiencing cVDPV outbreaks and the number of expected polio cases both before and after bOPV cessation. We identified the need for substantial increases in overall bOPV coverage prior to bOPV cessation to achieve a high probability of successful bOPV cessation. Full article
(This article belongs to the Special Issue Human Poliovirus)
Show Figures

Figure 1

Figure 1
<p>Histogram of bOPV pSIAs in the 720 model subpopulations with intensification *. Abbreviations: bOPV, bivalent OPV, pSIA, preventive supplemental immunization activity. * Pakistan and Afghanistan 6 pSIAs (low coverage areas 7 pSIAs), most of the Democratic Republic of the Congo, Nigeria, and Ethiopia 2–3 pSIAs (low coverage areas 4–7 pSIAs), most of India 3 pSIAs (high-risk areas, including UP and Bihar, 5–7 pSIAs), most of Somalia and South Sudan 2 pSIAs (low-coverage areas 7 pSIAs), most of Ukraine 4 pSIAs (high-risk areas 6 pSIAs), Yemen and Papua New Guinea 6 pSIAs, most of Indonesia 1 pSIA (low coverage areas 3–4 pSIAs), most of the Syrian Arab Republic 1 pSIA (low coverage areas 2–3 pSIAs), most of Bangladesh 3 pSIAs (low coverage areas 5 pSIAs), Côte d’Ivoire, Mauritania, Egypt, and Haiti 4 pSIAs, Philippines 3 pSIAs, 3–4 pSIAs in low-coverage areas in modeled subpopulations that include countries such as: Albania, Algeria, Angola, Armenia, Azerbaijan, Benin, Bosnia and Herzegovina, Botswana, Burkina Faso, Burundi, Cambodia, Cameroon, Central African Republic, Chad, Comoros, Congo, Djibouti, Dominican Republic, El Salvador, Equatorial Guinea, Eritrea, Eswatini, Ethiopia, Gabon, Gambia, Georgia, Ghana, Guatemala, Guinea, Guinea-Bissau, Haiti, Honduras, Kazakhstan, Kyrgyzstan, Kenya, Lao People’s Democratic Republic, Lesotho, Liberia, Libya, Madagascar, Malawi, Mali, Mauritius, Montenegro, Morocco, Mozambique, Myanmar, Namibia, Nicaragua, Niger, Papua New Guinea, Philippines, Republic of Moldova, Rwanda, Senegal, Serbia, Sierra Leone, Somalia, State of Palestine, Sudan, Tajikistan, The Former Yugoslavian Republic of Macedonia, Togo, Tunisia, Turkmenistan, Uganda, Ukraine, United Republic of Tanzania, Viet Nam, Zambia, and Zimbabwe. The global model includes some of these countries due to risks posed by other countries in the same block. Generally, countries with WPV1 R<sub>0</sub> ≥ 10 with any levels of coverage would likely benefit from some pSIAs (e.g., the inclusion of pSIAs in India and Bangladesh), and all countries with subpopulations with coverage less than &lt;60% would likely need 3–4 pSIAs. The model does not provide refined estimates of the number of pSIAs and may not fully account for differential decreases in coverage that occurred during COVID-19 and persist in some countries.</p>
Full article ">Figure 2
<p>Expected annual polio cases for global bivalent oral poliovirus vaccine (bOPV) cessation occurring in 2027 and outbreak response for using monovalent OPV (mOPV) (assumptions and result from the prior study [<a href="#B48-pathogens-13-00804" class="html-bibr">48</a>]), or using updated assumptions for novel OPV (nOPV). Outbreak response scenarios for nOPV (baseline) assume nOPV2 best or nOPV2 worst from 2022 on, and outbreak response for type 1 or 3 using Sabin-strain bOPV until 2027, and then either homotypic nOPV best or nOPV worst for types 1 and 3 (see text and prior studies [<a href="#B48-pathogens-13-00804" class="html-bibr">48</a>,<a href="#B49-pathogens-13-00804" class="html-bibr">49</a>] for assumed characteristics of nOPV best and nOPV worst bounds).</p>
Full article ">Figure 3
<p>Expected annual polio cases for global bivalent OPV (bOPV) cessation in 2027 and outbreak response for type 2 using novel OPV (nOPV) with either nOPV2 best or nOPV2 worst from 2022 on, and outbreak response for type 1 or 3 using Sabin-strain bOPV until 2027, and then either homotypic nOPV best or nOPV worst (see text and prior studies [<a href="#B48-pathogens-13-00804" class="html-bibr">48</a>,<a href="#B49-pathogens-13-00804" class="html-bibr">49</a>] for assumed characteristics of nOPV best and nOPV worst bounds) after bOPV cessation without (baseline) and with additional preventive supplemental immunization activities using bOPV (i.e., intensification) added in some model subpopulations (see text and <a href="#pathogens-13-00804-f001" class="html-fig">Figure 1</a>).</p>
Full article ">
16 pages, 3426 KiB  
Article
Maximizing Upconversion Luminescence of Co-Doped CaF₂:Yb, Er Nanoparticles at Low Laser Power for Efficient Cellular Imaging
by Neha Dubey, Sonali Gupta, Sandeep B. Shelar, K. C. Barick and Sudeshna Chandra
Molecules 2024, 29(17), 4177; https://doi.org/10.3390/molecules29174177 - 3 Sep 2024
Cited by 1 | Viewed by 1480
Abstract
Upconversion nanoparticles (UCNPs) are well-reported for bioimaging. However, their applications are limited by low luminescence intensity. To enhance the intensity, often the UCNPs are coated with macromolecules or excited with high laser power, which is detrimental to their long-term biological applications. Herein, we [...] Read more.
Upconversion nanoparticles (UCNPs) are well-reported for bioimaging. However, their applications are limited by low luminescence intensity. To enhance the intensity, often the UCNPs are coated with macromolecules or excited with high laser power, which is detrimental to their long-term biological applications. Herein, we report a novel approach to prepare co-doped CaF2:Yb3+ (20%), Er3+ with varying concentrations of Er (2%, 2.5%, 3%, and 5%) at ambient temperature with minimal surfactant and high-pressure homogenization. Strong luminescence and effective red emission of the UCNPs were seen even at low power and without functionalization. X-ray diffraction (XRD) of UCNPs revealed the formation of highly crystalline, single-phase cubic fluorite-type nanostructures, and transmission electron microscopy (TEM) showed co-doped UCNPs are of ~12 nm. The successful doping of Yb and Er was evident from TEM–energy dispersive X-ray analysis (TEM-EDAX) and X-ray photoelectron spectroscopy (XPS) studies. Photoluminescence studies of UCNPs revealed the effect of phonon coupling between host lattice (CaF2), sensitizer (Yb3+), and activator (Er3+). They exhibited tunable upconversion luminescence (UCL) under irradiation of near-infrared (NIR) light (980 nm) at low laser powers (0.28–0.7 W). The UCL properties increased until 3% doping of Er3+ ions, after which quenching of UCL was observed with higher Er3+ ion concentration, probably due to non-radiative energy transfer and cross-relaxation between Yb3+-Er3+ and Er3+-Er3+ ions. The decay studies aligned with the above observation and showed the dependence of UCL on Er3+ concentration. Further, the UCNPs exhibited strong red emission under irradiation of 980 nm light and retained their red luminescence upon internalization into cancer cell lines, as evident from confocal microscopic imaging. The present study demonstrated an effective approach to designing UCNPs with tunable luminescence properties and their capability for cellular imaging under low laser power. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>(<b>a</b>) XRD patterns of pure CaF<sub>2</sub> and different UCNPs, and (<b>b</b>) shifting of the (220) diffraction peak towards the lower angle.</p>
Full article ">Figure 2
<p>TEM micrographs of (<b>a</b>) pure CaF<sub>2</sub> and (<b>b</b>) UCNPs-2 (inset: their HRTEM micrographs showing lattice spacing), SAED patterns of (<b>c</b>) pure CaF<sub>2</sub> and (<b>d</b>) UCNPs-2 (inset: particle size distribution plots obtained from respective TEM micrographs of the figure), and TEM-EDS analysis of (<b>e</b>) pure CaF<sub>2</sub> and (<b>f</b>) UCNPs-2.</p>
Full article ">Figure 3
<p>High-resolution XPS spectra of Ca 2p, Ca 2s, F 1s, and Yb 4d-Er 4d of UCNPs-2.</p>
Full article ">Figure 4
<p>PL spectra of (<b>a</b>) UCNPs-2, (<b>b</b>) UCNPs-2.5, (<b>c</b>) UCNPs-3, and (<b>d</b>) UCNPs-5 under irradiation of 980 nm laser light. Inset of <a href="#molecules-29-04177-f004" class="html-fig">Figure 4</a>a shows the photograph of revealing red emission arising from UCNPs-2 under irradiation of 980 nm laser light.</p>
Full article ">Figure 5
<p>(<b>a</b>) Energy level diagram of co-doped CaF<sub>2</sub>:Yb<sup>3+</sup>, Er<sup>3+</sup> nanoparticles solid; dotted and dashed-doted arrows represent photon absorption or emission, energy transfer, and relaxation processes, respectively; and (<b>b</b>) CIE chromaticity diagram showing color coordinates.</p>
Full article ">Figure 6
<p>(<b>a</b>) Influence of varying amounts of Er<sup>3+</sup> on UCL intensity of UCNPs and (<b>b</b>) decay kinetics for green (λ<sub>em</sub> = 50 nm) and red (λ<sub>em</sub> = 660 nm) emission.</p>
Full article ">Figure 7
<p>Confocal microscopy images of A549 and MCF-7 cells after overnight incubation with UCNPs-2 under 980 nm laser light irradiation (Scale bar: 10 µm).</p>
Full article ">Scheme 1
<p>Schematic representation of synthesis of CaF<sub>2</sub> and CaF<sub>2</sub>:Yb<sup>3+</sup>, Er<sup>3+</sup> UCNPs.</p>
Full article ">
24 pages, 478 KiB  
Article
Energy Consumption Modeling for Heterogeneous Internet of Things Wireless Sensor Network Devices: Entire Modes and Operation Cycles Considerations
by Canek Portillo, Jorge Martinez-Bauset, Vicent Pla and Vicente Casares-Giner
Telecom 2024, 5(3), 723-746; https://doi.org/10.3390/telecom5030036 - 2 Aug 2024
Viewed by 1397
Abstract
Wireless sensor networks (WSNs) and sensing devices are considered to be core components of the Internet of Things (IoT). The performance modeling of IoT–WSN is of key importance to better understand, deploy, and manage this technology. As sensor nodes are battery-constrained, a fundamental [...] Read more.
Wireless sensor networks (WSNs) and sensing devices are considered to be core components of the Internet of Things (IoT). The performance modeling of IoT–WSN is of key importance to better understand, deploy, and manage this technology. As sensor nodes are battery-constrained, a fundamental issue in WSN is energy consumption. Additional issues also arise in heterogeneous scenarios due to the coexistence of sensor nodes with different features. In these scenarios, the modeling process becomes more challenging as an efficient orchestration of the sensor nodes must be achieved to guarantee a successful operation in terms of medium access, synchronization, and energy conservation. We propose a novel methodology to determine the energy consumed by sensor nodes deploying a recently proposed synchronous duty-cycled MAC protocol named Priority Sink Access MAC (PSA-MAC). We model the operation of a WSN with two classes of sensor devices by a pair of two-dimensional Discrete-Time Markov Chains (2D-DTMC), determine their stationary probability distribution, and propose new expressions to compute the energy consumption based solely on the obtained stationary probability distribution. This new approach is more systematic and accurate than previously proposed ones. The new methodology to determine energy consumption takes into account different specific features of the PSA-MAC protocol as: (i) the synchronization among sensor nodes; (ii) the normal and awake operation cycles to ensure synchronization among sensor nodes and energy conservation; (iii) the two periods that compose a full operation cycle: the data and sleep periods; (iv) two transmission schemes, SPT (single packet transmission) and APT (aggregated packet transmission) (v) the support of multiple sensor node classes; and (vi) the support of different priority assignments per class of sensor nodes. The accuracy of the proposed methodology has been validated by an independent discrete-event-based simulation model, showing that very precise results are obtained. Full article
Show Figures

Figure 1

Figure 1
<p>Heterogeneous WSN scenario with <math display="inline"><semantics> <mrow> <mi mathvariant="normal">C</mi> <mn>1</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi mathvariant="normal">C</mi> <mn>1</mn> </mrow> </semantics></math> SNs, and corresponding <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>1</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 2
<p>Transmission process in a transmission cycle for a heterogeneous WSN with two classes of nodes.</p>
Full article ">Figure 3
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>1</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying SPT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 4
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>2</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying SPT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 5
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>1</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 6
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>2</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 7
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>1</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 8
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>2</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 9
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>1</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 10
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>2</mn> </mrow> </semantics></math> per cycle during the <span class="html-italic">data</span> period, and in the <span class="html-italic">awake</span> and <span class="html-italic">normal</span> cycles, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 11
<p>Average energy consumed by <math display="inline"><semantics> <mrow> <mi>RN</mi> <mn>2</mn> </mrow> </semantics></math> per cycle due to PF transmissions with success and failure, and to overhearing, when deploying APT (<math display="inline"><semantics> <mrow> <msub> <mi>F</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 12
<p>Average packet delay for both SNs classes.</p>
Full article ">Figure 13
<p>Average relative errors of the current and previous (Pre-method) energy computation methodologies.</p>
Full article ">
24 pages, 1104 KiB  
Article
A Learning-Based Energy-Efficient Device Grouping Mechanism for Massive Machine-Type Communication in the Context of Beyond 5G Networks
by Rubbens Boisguene, Ibrahim Althamary and Chih-Wei Huang
J. Sens. Actuator Netw. 2024, 13(3), 33; https://doi.org/10.3390/jsan13030033 - 28 May 2024
Cited by 1 | Viewed by 1483
Abstract
With the increasing demand for high data rates, low delay, and extended battery life, managing massive machine-type communication (mMTC) in the beyond 5G (B5G) context is challenging. MMTC devices, which play a role in developing the Internet of Things (IoT) and smart cities, [...] Read more.
With the increasing demand for high data rates, low delay, and extended battery life, managing massive machine-type communication (mMTC) in the beyond 5G (B5G) context is challenging. MMTC devices, which play a role in developing the Internet of Things (IoT) and smart cities, need to transmit short amounts of data periodically within a specific time frame. Although blockchain technology is utilized for secure data storage and transfer while digital twin technology provides real-time monitoring and management of the devices, issues such as constrained time delays and network congestion persist. Without a proper data transmission strategy, most devices would fail to transmit in time, thus defying their relevance and purpose. This work investigates the problem of massive random access channel (RACH) attempts while emphasizing the energy efficiency and access latency for mMTC devices with critical missions in B5G networks. Using machine learning techniques, we propose an attention-based reinforcement learning model that orchestrates the device grouping strategy to optimize device placement. Thus, the model guarantees a higher probability of success for the devices during data transmission access, eventually leading to more efficient energy consumption. Through thorough quantitative simulations, we demonstrate that the proposed learning-based approach significantly outperforms the other baseline grouping methods. Full article
Show Figures

Figure 1

Figure 1
<p>The communication scheme between applications passing tasks to MTDs.</p>
Full article ">Figure 2
<p>The task execution in groups from an application perspective.</p>
Full article ">Figure 3
<p>The task execution in groups from a device perspective.</p>
Full article ">Figure 4
<p>The RL structure for massive MTC devices performing an RACH to access the B5G network. Following the reward, the agent optimizes its policy to group the devices further in the current environment.</p>
Full article ">Figure 5
<p>Success and failure probabilities vs. number of preambles (k).</p>
Full article ">Figure 6
<p>Miss rate results of the different scenarios.</p>
Full article ">Figure 7
<p>Total energy consumption per method.</p>
Full article ">Figure 8
<p>Overall RACH-access delay per collision percentage.</p>
Full article ">Figure 9
<p>Probability density function of latency by different methods.</p>
Full article ">
Back to TopTop