You are currently viewing a new version of our website. To view the old version click .
Journal of Sensor and Actuator Networks
  • Article
  • Open Access

10 February 2023

Power Distribution of D2D Communications in Case of Energy Harvesting Capability over κ-μ Shadowed Fading Conditions

,
,
and
1
Advanced Systems Engineering Lab (ASELab), Ibn Tofail University, Kenitra 14000, Morocco
2
SIRC-LAGES, Electrical Engineering Department, Hassania School of Public Labors, Casablanca 20250, Morocco
*
Author to whom correspondence should be addressed.

Abstract

Device-to-device (D2D) communication will play a meaningful role in future wireless networks and standards, since it ensures ultra-low latency for communication among near devices. D2D transmissions can take place together with the actual cellular communications, so handling the interference is very important. In this paper, we consider a D2D couple operating in the uplink band in an underlaid mode, and, using the stochastic geometry, we propose a cumulative distribution function (CDF) of the D2D transmit power under κ - μ shadowed fading. Then, we derive some special cases for some fading channels, such as Nakagami and Rayleigh environments, and for the interference-limited scenario. Moreover, we propose a radio frequency energy harvesting, where the D2D users can harvests ambient RF energy from cellular users. Finally, the analytical results are validated via simulation.

1. Introduction

The Internet of Things (IoT) has revolutionized the world through its centric concepts, such as augmented reality, high-resolution video streaming, self-driven cars, smart environment, e-health care, etc. This new paradigm is based on various technologies, such as the combining of sensing devices and embedded systems with cyber-physical systems, device-to-device (D2D) communications and 5G wireless systems [1]. One of the most important features of 5G networks is that it allows seamless connectivity for any type of devices, applications and heterogeneous networks. On the other hand, D2D communication is a promising technology that enables two or more neighbor devices to communicate directly, in either a stand-alone or a network-coordinated fashion. The potential of D2D communication in 6G cellular networks for applications of smart factories (such as industry 5.0) and vehicular communications, according to [2], has recently been underlined (e.g., autonomous driving and vehicular platooning). Infotainment is also one of the services provided among D2D. D2D communication provides some advantages, such as cellular coverage extension, data offloading, information sharing and energy efficiency [3]. This kind of communication can be also used for safety applications (rescue and search missions, road safety, etc.) [4]. While in [5], the authors tackled the problem of connectivity and security in terms of public safety based on D2D systems.
Regarding the spectrum allocated for D2D communications, two strategies can be envisioned [6]: (i) in-band, where cellular communication and D2D communication share the same spectrum licensed to the cellular network. This spectrum can be divided into non-overlapping or shared bands (respectively, overlaying and underlaying); (ii) out-band, where D2D communication exploits an unlicensed spectrum (ISM band). The overlay mode is easy to implement; even so, the underlay one is more efficient for spectrum usage. The coexistence of D2D and cellular communications in the same frequency band is challenging due to the hardness of interference handling as illustrated in Figure 1. This problem can be solved through power control and resource allocation [7]. This power control mechanism also contributes in device battery usage optimization. The issue of energy consumption in the context of D2D communication is very active in the research community [8,9,10]. In addition, energy harvesting techniques can substantially improve the operation duration of D2D equipments through the additional energy gathered [11].
Figure 1. D2D communications—interference challenge.
In this paper, we focus on the power control mechanism using stochastic geometry tools while considering general fading channel conditions. Further, we analyze the energy-harvesting capability in the D2D case. The contributions of this paper are summarized as follows:
  • In the context of D2D underlaid communications, we analyze the SINR at the receiver side when the channel fading is modeled as κ - μ shadowed. We then derive the CDF of the required transmission power to achieve the target where the SINR is greater than a threshold.
  • Based on the general form of CDF, some particular cases of channel fading, especially Nakagami and Rayleigh fading channels, are also derived. We also derive the transmit power distribution in a noiseless environment.
  • We consider the case where D2D transmitters are equipped with a radio frequency harvesting system. We assume that the power is gathered from the cellular users’ equipment transmitted energy. Then, we derive the expectation of the harvested energy. In addition, we calculate the expectation of the transmit power of D2D transmitters. Based on this finding, we suggest the probability that a D2D transmitter can achieve its transmission successfully.
  • Finally, the accuracy of the analytical results under different fading channel schemes is assessed through an extensive numerical simulation.
The remainder of this paper is structured as follows: In Section 2 we discuss some related works. Section 3 presents the system model for D2D communications under κ - μ shadowed fading channels. Section 4 analytically provides the distribution of transmit power and derives some relevant special cases. In Section 5, we present an RF energy-harvesting model based on the cellular ambient RF transmissions. Section 6 provides numerical results for both simulations and analytical derivations. Finally, the Section 7 concludes the paper.

3. System Model

In this work, we considered an underlaid scenario where multiple macro-cellular UEs and D2D users share the same frequency band as depicted in Figure 2. Independent homogeneous Poisson point processes (PPP) Φ C and Φ D with constant intensity λ C and λ D were used to model the location of cellular and D2D equipment, respectively. In order to transmit, each UE uses independent and identically distributed (i.i.d.) transmit powers.
Figure 2. System model.
We assumed that all links are affected by i.i.d. κ - μ shadowed fading, and we denoted by H the fading power. For the sake of brevity, we say that: H S ( β , κ , μ , m ) , where β = E [ H ] is the mean of H, and κ , μ , m are the parameters of the κ , μ shadowed distribution, with the conditions that: μ , m N , and μ m .
With this setting, and from [35], eqn. (4b)], the PDF of H is expressed as:
f H ( x ) ω d Γ ( d ) . x d 1 . e ω . x
with parameters defined as d = m μ ( 1 + κ ) 2 m + μ κ 2 + 2 m κ , and ω = d β .
In addition, the CCDF of H (from [36], Equation (13)]) is given as:
F ¯ H ( x ) = i = 0 m μ b i . e c . x j = 0 m i 1 1 j ! c j . x j ,
with c = m μ ( 1 + κ ) β ( μ κ + m ) , and b i = ( m μ ) ! i ! ( m μ i ) ! . ( m μ κ + m ) i ( μ κ μ κ + m ) m μ i .
For a transmitter–receiver distance R, the path loss has a standard singular model of R α with a path-loss exponent α with 2 < α < 6 .
We supposed that each D2D receiver only connects to the nearest D2D transmitter and that each D2D transmitter communicates with exactly one D2D receiver. This is ensured if the D2D receiver outnumbers the D2D transmitter, if not, some D2D transmitters will have no receiver, and these D2D transmitters will be inactive [32].
Without a loss of generality, we are interested in a typical D2D link where the transmitter is located at the origin O , and denote it as subscript 0. Let P 0 be the typical D2D transmitter transmit power, H 0 be the fading power in the typical D2D communication channel and the distance between the typical D2D transmitter and receiver be R 0 . Hence, we can express the received power in the typical D2D link as
P r = P 0 , D . H 0 , D . R 0 , D α ,
At the typical D2D receiver, the total interference caused by the other D2D transmitters is given as:
I D = i { ϕ D \ O } P i , D . H i , D . R i , D α ,
and the interference caused by all cellular transmitters is given by the following expression:
I C = i ϕ C P i , C . H i , C . R i , C α ,
where P i , . , H i , . and R i , . represent the transmit power, the channel fading power and the locations of the cellular user (subscript C) and D2D users (subscript D), respectively. In the expression of D2D interference I D , we exclude the signal power generated by our D2D typical transmitter. Note that I C and I D are independents, as we consider that the transmit power, the fading power and the location of cellular and D2D users are all independent of each other.
In this paper, we focus our study on one macro-cell area, and we consider that the interference from other neighbor cells is negligible. Thus, the S I N R at the typical D2D receiver is given by
S I N R = P r I C + I D + N 0 = P 0 , D . H 0 , D . R 0 , D α I C + I D + N 0 T ,
where N 0 is the noise power and T is the minimum S I N R threshold required for a successful communication between a D2D pair. Table 3 recaps all variables used in our system model:
Table 3. List of variables.

4. CDF of Transmit Power

Theorem 1.
In a D2D-underlaid cellular network with multiple macro-cellular UEs and D2D users, the converged C D F  of the transmit power of D2D users, assuming κ-μ shadowed fading channels, is
P ( P p ) = i , j f ( i , j ) . 0 r 1 + α j . e k 1 . r α k 2 . r 2 d r + i , j , k , l , M g ( i , j , k , l , M ) . 0 r 1 + 2 l + α ( j k ) . e k 1 . r α k 2 . r 2 d r + i , j , k , t , l , s , M h ( i , j , k , t , l , s , M ) 0 r 1 + 2 ( l + s ) + α ( j k ) . e k 1 r α k 2 r 2 d r
where  k 1 ,  k 2 ,  f ( . ) ,  g ( . , . )  and  h ( . , . )  will be detailed by the end of the proof.
Proof. 
The C D F of the D2D transmit power, where it is conditioned on R 0 and considering I = I C + I D , is
P ( P p ) = P H 0 T . R 0 α ( I + N 0 ) p = E R [ P ( H 0 T . R 0 α ( I + N 0 ) p | R 0 ) ] = E R [ i = 0 m μ b i . e c T R 0 α ( I + N 0 ) p j = 0 m i 1 1 j ! c j T . R 0 α ( I + N 0 ) p j ] = i = 0 m μ b i j = 0 m i 1 1 j ! ( T c p ) j E R R 0 α . j . e c T N 0 p R 0 α . ( I + N 0 ) j . e c T p I . R 0 α = i = 0 m μ b i j = 0 m i 1 1 j ! ( T . c p ) j E R R 0 α . j . e c T N 0 p R 0 α . E I [ ( I + N 0 ) j . e c T R 0 α p I | R 0 ] = i = 0 m μ b i j = 0 m i 1 1 j ! ( T c p ) j k = 0 j C j k . N 0 j k E R R 0 α . j . e c T N 0 p R 0 α . E I [ I k . e c T R 0 α p I | R 0 ]
where C j k = j ! k ! ( j k ) ! . Separating the terms when j = 0 and k = 0 and making some development, we obtained
P ( P p ) = i = 0 m μ b i j = 0 m i 1 1 j ! ( T . c p ) j N 0 j E R R 0 α . j . e c . T . N 0 p R 0 α . E I [ e c . T . R 0 α p I | R 0 ] + i = 0 m μ b i j = 1 m i 1 1 j ! ( T . c p ) j k = 1 j C j k . N 0 j k E R R 0 α . j . e c . T . N 0 p R 0 α . E I [ I k . e c . T . R 0 α p I | R 0 ]
Starting with the first expectation over I and putting s = c T R 0 α / p , we obtain
E I 1 = E I [ e s . I ] = L I ( s )
Since the total interference is: I = I D + I C and I D and I C are independent, we have
E I 1 = L I D ( s ) . L I C ( s )
Thus, in the first step, we try to calculate L I D ( s ) :
L I D ( s ) = E I D [ e s . I D ] = E I D e s . i { ϕ D \ O } P i , D . H i , D . R i , D α = E P , H , ϕ i { ϕ D \ O } e s . P i , D . H i , D . R i , D α = E ϕ i { ϕ D \ O } E P [ 0 e s y R i , D α P i , D . ω d Γ ( d ) . y d 1 e ω y d y ] = E ϕ i { ϕ D \ O } E P [ ω d ( ω + s R i , D α P i , D ) d ]
Based on the probability-generating functional ( P G F L ) theorem for P P P , and neglecting the small integration from 0 to R 0 , we obtain:
L I D ( s ) = e x p λ D R 2 1 E P [ ω d ( ω + s P i , D . x α ) d ] d x = e x p λ D . E P R 2 ( 1 ω d ( ω + s P i , D . x α ) d ) d x = e x p λ D . E P 2 π 0 ( 1 1 ( 1 + s P i , D . r α ω ) d ) r . d r = e x p λ D . E P π ( s P D / ω ) 2 / α Γ ( 1 2 α ) . Γ ( d + 2 α ) Γ ( d ) = e x p λ D π ( s ω ) 2 α . Γ ( 1 2 α ) . Γ ( d + 2 α ) Γ ( d ) E P P D 2 / α
By the same way, we obtain for the Laplace transform L I C ( s ) with the following result:
L I C ( s ) = e x p λ C π ( s ω ) 2 α . Γ ( 1 2 α ) . Γ ( d + 2 α ) Γ ( d ) E P P C 2 / α
hence, the final expression of E I 1 is:
E I 1 = e x p π ( s ω ) 2 α . Γ ( 1 2 α ) . Γ ( d + 2 α ) Γ ( d ) ( λ D E P P D 2 / α + λ C E P P C 2 / α )
now, passing to the second expectation over I in (8), denoted by E I 2 :
E I 2 = E I [ I k . e s . I ] = E I [ ( I D + I C ) k . e s ( I D + I C ) ] = E I [ t = 0 k C k t I D t I C k t e s . I D . e s . I C ] = t = 0 k C k t E I [ ( I D t . e s . I D ) . ( I C k t . e s . I C ) ] = t = 0 k C k t E I D [ I D t . e s . I D ] . E I C [ I C k t . e s . I C ] = E I D [ e s . I D ] . E I C [ I C k . e s . I C ] + E I D [ I D k . e s . I D ] . E I C [ e s . I C ] + t = 1 k 1 C k t E I D [ I D t . e s . I D ] . E I C [ I C k t . e s . I C ]
We note that C k t = k ! t ! ( k t ) ! . The last step comes from the fact that the expected value of the product of independent variables is the product of expected values.
Thus, we start by calculating the first term in the last equation, denoted by E I 2 , D . Using Theorem 2 in [37] for t N * , we have
E I 2 , D = E I D [ I D t . e s . I D ] = exp ( λ D R 2 \ D ( 1 E H , P [ exp ( s H i , D . x α P i , D ) ] ) d x ) . l = 1 t M N l C M l ! i = 1 l λ D . R 2 E H , P [ exp ( s H i , D . x α P i , D ) ( H i , D . x α P i , D ) m i ] d x
where C M = t ! r = 1 l m r ! , N l is the set of vectors M with l natural elements, M 1 = i = 1 l m i = t and D is the disk of origin O and radius R 0 .
Let us calculate the expressions of E H , P [ 1 ] and E H , P [ 2 ] , related to the expectations given in (11), respectively:
E H , P [ 1 ] = E H , P [ exp ( s H i , D R α P i , D ) ] = e s P i , D R α . H i , D . f ( H ) . f ( P ) d H d P = 0 0 e s y P i , D R α ω d Γ ( d ) y d 1 e ω y d y f ( P ) d P = E P 1 ( 1 + s R α P i , D ω ) d
The second expectation can be defined as:
E H , P [ 2 ] = E H , P [ exp ( s H i , D . R α P i , D ) . ( H i , D . R α P i , D ) m 1 ] = E P 0 e s y P i , D R α . ( y P i , D R α ) m i . ω d Γ ( d ) . y d 1 . e ω y d y = E P ( P i , D R α ) m i . ω d Γ ( d ) 0 y m i + d 1 . e ( s P i , D R α + ω ) y d y = E P ω d . Γ ( m i + d ) Γ ( d ) . ( P i , D R α ) m i ( ω + s P i , D R α ) m i + d
Based on (11) and (12), the expression of E I 2 , D is given as:
E I 2 , D = exp λ D R 2 \ D ( 1 E P [ 1 ( 1 + s x α P i , D ω ) d ] ) d x l = 1 t M N l C M l ! i = 1 l λ D R 2 E P ω d . Γ ( m i + d ) Γ ( d ) . ( x α P i , D ) m i ( ω + s x α P i , D ) m i + d d x = exp λ D E P [ R 2 \ D ( 1 1 ( 1 + s x α P i , D ω ) d ) d x ] l = 1 t M N l C M l ! i = 1 l λ D E P R 2 ω d . Γ ( m i + d ) Γ ( d ) . ( x α P i , D ) m i ( ω + s x α P i , D ) m i + d d x
We express both integrals with respect to x:
J = R 2 \ D 1 1 ( 1 + s P D . x α ω ) d d x 2 π 0 1 1 ( 1 + s P D . r α ω ) d r . d r π ( s P D ω ) 2 / α . Γ ( 1 2 / α ) . Γ ( d + 2 / α ) Γ ( d )
The second integral is:
K = ω d . Γ ( m i + d ) Γ ( d ) R 2 ( P D x α ) m i ( ω + s P D x α ) d + m i d x = 2 π ω d . Γ ( m i + d ) Γ ( d ) . 0 + ( P D . r α ) m i ( ω + s P D . r α ) d + m i r . d r = 2 π α . s m i . ( s P D ω ) 2 / α . Γ ( m i 2 α ) . Γ ( d + 2 α ) Γ ( d )
Thus, the final form of E I 2 , D is given as:
E I 2 , D = exp π λ D Γ ( d ) . ( s ω ) 2 / α . Γ ( 1 2 α ) . Γ ( d + 2 α ) . E P [ P D 2 α ] l = 1 t M N l C M l ! i = 1 l 2 π λ D α . s m i Γ ( d ) . ( s ω ) 2 / α Γ ( d + 2 α ) . Γ ( m i 2 α ) . E P [ P D 2 α ]
Using the same method as done with E I 2 , D , we have:
E I 2 , C = E I C [ I C k t . e s . I C ] = exp π λ C Γ ( d ) . ( s ω ) 2 / α . Γ ( 1 2 α ) . Γ ( d + 2 α ) . E P [ P C 2 α ] l = 1 k t M N l C M l ! i = 1 l 2 π λ C α . s m i Γ ( d ) . ( s ω ) 2 / α Γ ( d + 2 α ) . Γ ( m i 2 α ) . E P [ P C 2 α ]
Now, we can calculate the total expression of E I 2 based on (13), (14) and (10):
E I 2 = exp π Γ ( d ) . ( s ω ) 2 / α . Γ ( 1 2 α ) . Γ ( d + 2 α ) ( λ D . E D + λ C . E C ) . [ l = 1 k M N l C M l ! i = 1 l 2 π α . s m i Γ ( d ) . ( s ω ) 2 / α Γ ( d + 2 α ) . Γ ( m i 2 α ) ( λ D E D + λ C E C ) + t = 1 k 1 C k t l = 1 t M N l C M l ! i = 1 l 2 π α . s m i Γ ( d ) . ( s ω ) 2 / α Γ ( d + 2 α ) . Γ ( m i 2 α ) λ D E D l = 1 k t M N l C M l ! i = 1 l 2 π α . s m i Γ ( d ) . ( s ω ) 2 / α Γ ( d + 2 α ) Γ ( m i 2 α ) λ C E C ]
where E D = E P [ P D 2 α ] and E C = E P [ P C 2 α ] .
We can then have the expression of our C D F using the P D F of R 0 expressed in [38]: f R 0 ( r ) = 2 π λ D r . e π λ D . r 2 .
Thus, (8) becomes:
P ( P p ) = i = 0 m μ b i j = 0 m i 1 1 j ! ( T . c p ) j . N 0 j 0 2 π λ r . e π λ r 2 r α j . e c . T . N 0 p r α . e π Γ ( d ) ( c T ω p ) 2 α . Γ ( 1 2 α ) Γ ( d + 2 α ) ( λ D E D + λ C E C ) r 2 d r + i = 0 m μ b i j = 1 m i 1 1 j ! ( T . c p ) j . k = 1 j C j k . N 0 j k 0 2 π λ r . e π λ r 2 r α j . e c . T . N 0 p r α . e π Γ ( d ) ( c T ω p ) 2 α . Γ ( 1 2 α ) Γ ( d + 2 α ) . ( λ D E D + λ C E C ) . r 2 l = 1 k M N l C M l ! i = 1 l 2 π α Γ ( d ) ( 1 ω ) 2 α ( c T p ) 2 α m i Γ ( d + 2 α ) . Γ ( m i 2 α ) ( λ D E D + λ C E C ) r 2 α m i + i = 0 m μ b i j = 1 m i 1 1 j ! ( T . c p ) j . k = 1 j C j k . N 0 j k 0 2 π λ r . e π λ r 2 r α j . e c . T . N 0 p r α . e π Γ ( d ) ( c T ω p ) 2 α . Γ ( 1 2 α ) Γ ( d + 2 α ) . ( λ D E D + λ C E C ) r 2 t = 1 k 1 C k t l = 1 t M N l C M l ! i = 1 l 2 π α Γ ( d ) . ( 1 ω ) 2 / α ( c T p ) 2 / α m i Γ ( d + 2 α ) . Γ ( m i 2 α ) λ D E D r 2 α m i l = 1 k t M N l C M l ! i = 1 l 2 π α Γ ( d ) ( 1 ω ) 2 α ( c T p ) 2 α m i Γ ( d + 2 α ) Γ ( m i 2 α ) λ C E C r 2 α m i d r
Finally, the transmit power CDF is expressed as follows:
P ( P p ) = i , j f ( i , j ) 0 r 1 + α j e k 1 r α k 2 r 2 d r + i , j , k , l , M g ( i , j , k , l , M ) 0 r 1 + 2 l + α ( j k ) e k 1 r α k 2 r 2 d r + i , j , k , t , l , M h ( i , j , k , t , l , M ) 0 r 1 + 2 ( l + s ) + α ( j k ) e k 1 r α k 2 r 2 d r
where k 1 = c T N 0 p , k 2 = π λ D + π ( c T ω p ) 2 / α . Γ ( 1 2 α ) . Γ ( d + 2 α ) Γ ( d ) ( λ D E D + λ C E C ) .
Therefore, we have the first integral multiplier i , j f ( i , j ) = i = 0 m μ b i j = 0 m i 1 2 π λ D j ! ( T c p ) j . N 0 j , the second i , j , k , l , M g ( i , j , k , l , M ) = i = 0 m μ b i j = 1 m i 1 2 π λ D j ! ( T c p ) j k = 1 j C j k N 0 j k l = 1 k M N l C M l ! i = 1 l 2 π α Γ ( d ) . ( 1 ω ) 2 / α ( c T p ) 2 / α m i Γ ( m i 2 α ) Γ ( d + 2 α ) ( λ D E D + λ C E C ) , and the last integral multiplier i , j , k , t , l , M h ( i , j , k , t , l , M ) = i = 0 m μ b i j = 1 m i 1 2 π λ D j ! ( T c p ) j k = 1 j C j k N 0 j k t = 1 k 1 C k t l = 1 t s = 1 k t ( λ D E D ) l ( λ C E C ) s ( M N l C M l ! i = 1 l 2 π α Γ ( d ) . ( 1 ω ) 2 / α ( c T p ) 2 / α m i Γ ( m i 2 α ) Γ ( d + 2 α ) ) ( M N s C M s ! i = 1 s 2 π α Γ ( d ) . ( 1 ω ) 2 / α ( c T p ) 2 / α m i Γ ( m i 2 α ) Γ ( d + 2 α ) )
  • There is a circularity in our CDF, in which, E D depends on the PDF of P D . Thus, by differentiating (17) and making some variables change, we obtain:
E D = i , j f ( i , j ) 0 1 2 A 2 2 j . x j 1 2 α + A 1 x j 2 α + 2 A 3 α x j 1 + 2 A 4 α E D x j 1 . e A 1 x A 3 x 2 / α A 4 . E D . x 2 α d x + 1 2 A 2 2 i , j , k , l g ( i , j , k , l ) 0 ( k 2 l α j ) x 1 + A 1 + 2 α A 3 x 2 α 1 + 2 α A 4 . E D . x 2 α 1 . x 2 l α + j 2 α k . e A 1 x A 3 x 2 / α A 4 . E D . x 2 α d x + 1 2 A 2 2 i , j , k , l h ( i , j , k , l ) 0 ( k 2 ( l + s ) α j ) x 1 + A 1 + 2 α A 3 x 2 α 1 + 2 α A 4 . E D . x 2 α 1 . x 2 ( l + s ) α + j 2 α k . e A 1 x A 3 x 2 / α A 4 . E D . x 2 α d x
with: A 1 = c T N 0 ; A 2 = π λ D ;   A 3 = π ( c T ω ) 2 α . Γ ( 1 2 α ) . Γ ( d + 2 α ) Γ ( d ) λ C E C ;   A 4 = π ( c T ω ) 2 α . Γ ( 1 2 α ) . Γ ( d + 2 α ) Γ ( d ) λ D ;
i , j f ( i , j ) = i = 0 m μ b i j = 0 m i 1 2 π λ D j ! ( T . c ) j . N 0 j ; i , j , k , l g ( i , j , k , l ) = i = 0 m μ b i j = 1 m i 1 2 π λ D j ! ( T c ) j k = 1 j C j k N 0 j k l = 1 k M N l C M l ! i = 1 l 2 π α Γ ( d ) . ( 1 ω ) 2 / α ( c T ) 2 / α m i Γ ( m i 2 α ) Γ ( d + 2 α ) ( λ D E D + λ C E C ) ,
i , j , k , l h ( i , j , k , l ) = i = 0 m μ b i j = 1 m i 1 2 π λ D j ! ( T c ) j k = 1 j C j k N 0 j k t = 1 k 1 C k t l = 1 t s = 1 k t ( λ D E D ) l ( λ C E C ) s ( M N l C M l ! i = 1 l 2 π α Γ ( d ) . ( 1 ω ) 2 / α ( c T ) 2 / α m i Γ ( m i 2 α ) Γ ( d + 2 α ) ) ( M N s C M s ! i = 1 s 2 π α Γ ( d ) . ( 1 ω ) 2 / α ( c T ) 2 / α m i Γ ( m i 2 α ) Γ ( d + 2 α ) )
This result is still difficult to solve analytically, so we should use numerical techniques to solve it.
The convergence of our power distribution is obtained with the Foschini–Miljanic algorithm described in Section 5.
  • Based on Table I in [39], we can obtain many distributions. As the κ - μ distribution is a special case of a κ - μ shadowed distribution (when μ m ), we can easily express our CDF in the case of the κ - μ fading environment by putting m . We will highlight other special cases in the following corollaries, as they have more closed forms.
Corollary 1.
In the Nakagami fading case, the CDF is
P ( P p ) = j f ( j ) 0 r 1 + α j e k 1 r α k 2 r 2 d r + j , k , l , M g ( j , k , l , M ) 0 r 1 + 2 l + α ( j k ) e k 1 r α k 2 r 2 d r + j , k , t , l , s , M h ( j , k , t , l , s , M ) 0 r 1 + 2 ( l + s ) + α ( j k ) e k 1 r α k 2 r 2 d r
The CDF has the same general form, but the external parameters are more simplified:
k 1 = T . N 0 θ . p ,  
k 2 = π λ D + π ( T p ) 2 / α . Γ ( 1 2 / α ) . Γ ( n + 2 / α ) ( n 1 ) ! ( λ D E D + λ C E C ) ,
   j f ( j ) = j = 0 n 1 2 π λ D j ! ( T p θ ) j . N 0 j ,
j , k , l , M g ( j , k , l , M ) = j = 1 n 1 2 π λ D j ! ( T p θ ) j k = 1 j C j k N 0 j k l = 1 k M N l C M l ! i = 1 l 2 π θ 2 / α α ( n 1 ) ! ( T p θ ) 2 / α m i Γ ( m i 2 α ) Γ ( n + 2 α ) ( λ D E D + λ C E C ) ,
j , k , t , l , s , M h ( j , k , t , l , s , M ) = j = 1 n 1 2 π λ D j ! ( T p θ ) j k = 1 j C j k N 0 j k t = 1 k 1 C k t l = 1 t s = 1 k t ( λ D E D ) l ( λ C E C ) s ( M N l C M l ! i = 1 l 2 π θ 2 / α α ( n 1 ) ! ( T p θ ) 2 / α m i Γ ( m i 2 α ) Γ ( n + 2 α ) ) . ( M N s C M s ! i = 1 s 2 π θ 2 / α α ( n 1 ) ! ( T p θ ) 2 / α m i Γ ( m i 2 α ) Γ ( n + 2 α ) )
This result is found by putting κ = 0 , μ = m = n and β = n θ , where n is the shape parameter and θ is the scale parameter of gamma distribution.
Corollary 2.
In the case of Rayleigh fading, the CDF can be written as
P ( P p ) = 0 e k 1 r α / 2 k 2 r d r
with k 1 = T . N 0 σ p ( π λ D ) α / 2 , k 2 = 1 + 1 s i n c ( 2 / α ) ( T p ) 2 α ( E D + λ C λ D E C )
This result is found by putting κ = 0 , μ = m = 1 and β = σ , where σ is the mean of e x p ( 1 / σ ) distribution.
Corollary 3.
In an interference-limited scenario, i.e N 0 0 , the C D F of the D 2 D transmit power in the Rayleigh environment is simplified to
P ( P p ) = 1 1 + ( T p ) 2 α 1 s i n c ( 2 / α ) ( E D + λ C λ D E C )

5. RF Energy-Harvesting Model

In our model, we considered RF energy harvesting for D2D users, where the locations of cellular transmitters contribute to the aggregate RF energy at the D2D harvester. We focused on energy harvesting for D2D users rather than cellular users, since the D2D transmitter requires much less power to communicate over short distances [40]. In addition, similar to [26], we assumed that D2D users cannot simultaneously transmit and harvest RF energy. This is due to the fact that the device can have only one antenna that can be switched between the transmit/receive mode and harvesting mode.

5.1. Expected RF Energy Harvesting Rate

Theorem 2.
The expected RF energy-harvesting rate in the case of Rayleigh fading with mean σ is given as
η = 2 π τ ν e σ λ C E C α / 2 ( α 2 ) R 0 α 2 ,
where τ represents the fraction of the time period where the device harvests the RF energy—that is, 0 < τ 1 ν e  is the RF energy conversion efficiency and  E C = E [ P C 2 / α ] .
Proof. 
The energy is harvested from the interferences in the τ product time frame. Let E [ I C ] be the expectation of the interferences
E [ I C ] = E i { ϕ C } σ . R i , C α E [ P C ] = i { ϕ C } E σ . R i , C α E [ P C ] = σ . E [ P C ] i { ϕ C } E ϕ C [ R i , C α ] = σ . E [ P C ] E ϕ C [ i { ϕ C } R i , C α ] = ( a ) σ . E [ P C ] λ C R 2 x α d x = 2 π σ . E [ P C ] λ C 0 r 1 α d r
where ( a ) follows from Campbell’s theorem. The last integral diverges due to the lower bound, which is a consequence of the path loss law and the property of PPP where nodes can be arbitrarily close. However, in a real scenario, the interferers cannot coexist in the same location as the typical user. Thus, a small distance R 0 from the closest interferer is considered. In addition, assuming that the cellular transmit power is constant, then E [ P C ] = E C α / 2 . Substituting in (23) concludes the proof. □
Corollary 4.
In the case of a relatively lossy environment ( α = 4 ), the energy harvesting rate is expressed as
η = π τ ν e σ λ C ( E C R 0 ) 2 ,

5.2. Energy Utilization Rate

In the case of Rayleigh fading and a noiseless scenario, we express the D2D transmit power expectation as follows:
Lemma 1.
E [ P D ] = P m a x . 2 F 1 ( 1 , α 2 ; α 2 + 1 ; P m a x 2 / α κ )
where  κ = ( T ) 2 / α 1 s i n c ( 2 / α ) ( E D + λ c λ D E C ) ,  E D = κ [ ln ( 1 + P m a x 2 / α κ ) P m a x 2 / α κ + P m a x 2 / α ] and 2 F 1 ( . ) is the hypergeometric function.
Proof. 
Based on the transmit power limitation, we can rewrite the C D F of the D2D transmit power in the case of noiseless communication given in [33] as:
P ( P D p ) = 1 1 + ( β D p ) 2 / α 1 s i n c ( 2 / α ) ( E D + λ c λ D E C ) , i f   p P m a x 1 , i f   p > P m a x
Knowing that E [ P D ] = 0 ( 1 C D F ( x ) ) d x , we can easily obtain the result. □
In the case of α = 4 , E [ P D ] is simplified as in Lemma 2:
Lemma 2.
E [ P D ] = 2 κ 2 P m a x 1 / 2 κ ln ( P m a x 1 / 2 κ + 1 )
where  κ = T π 2 ( E D + λ C λ D E C )  and  E D = κ [ ln ( 1 + P m a x 1 / 2 κ ) P m a x 1 / 2 κ + P m a x 1 / 2 ]
In order to solve the equation of κ , we used the Matlab tool “fsolve”, which uses the trust region dogleg algorithm [41].
We already supposed that the device harvests the energy within a τ fraction of time, and transmits during 1 τ . Assuming that the major energy consumption is due to the transmission operation, we obtain the following result.
Theorem 3.
The energy utilization rate in a noiseless scenario and relatively lossy environment ( α = 4 ) can be expressed as
ν = 2 ( 1 τ ) κ 2 P m a x 1 / 2 κ ln ( P m a x 1 / 2 κ + 1 )

5.3. D2D User Transmission Probability

In the case of α = 4 , and knowing that ρ = m i n ( 1 , η ν ) as defined in [21], we have:
ρ = m i n ( 1 , π τ ν e σ λ C E c 2 2 R 0 2 ( 1 τ ) κ 2 P m a x 1 / 2 κ ln ( P m a x 1 / 2 κ + 1 ) ) ,

6. Numerical Study

This section aims to provide numerical results that validate our finding. We start by presenting the parameters that we used in this assessment. Then, we give the obtained results and provide some interpretations.

6.1. Simulation Parameters

In this work, we considered a hexagonal cell with R c e l l = 250 m, in which, all UEs are uniformly and independently distributed, since the PPP is equivalent to the uniform distribution when the nodes number is already known [42]. For our experiments, we worked with the following values of the used parameters: κ = 5 , μ = 2 , m = 6 , β = 1 , λ C = 10 4 , λ D = 9 × 10 4 , N 0 = 100 dBm, E C = 5 × 10 8 , P m a x = 23 dBm and T = 0 dB. The transmitter power allocation was performed in a distributed fashion using the Foschini–Miljanic algorithm [43]. It allows transmitters devices to select their transmission power to achieve the SINR threshold at all links in a distributed manner. The i t h D2D transmitter calculates its transmit power at k + 1 time by:
P i ( k + 1 ) = ( 1 γ ) P i ( k ) 1 + γ 1 γ T β i ,
where T is the SINR threshold, β i is the actual SINR of the i t h D2D link and γ is the convergence rate constant. Thus, each device i should have the information about the value of γ , T and β i at each time k to execute the algorithm, which converges when T = β i . We set the convergence rate constant to γ = 0.062 .

6.2. Results and Discussions

Figure 3 shows the analytical and simulated transmit power CDF for different values of path loss exponent α . For a large value of α , the power required of each transmitter, in compensation of the severe channel power attenuation, becomes large. In addition, we can clearly observe that the analytical curves match the simulation ones.
Figure 3. CDF of the transmit power for different values of α .
Now, we want to investigate the behavior of our transmit power CDF with regard to different values of the parameter κ . We used the following simulation parameters: the densities λ C = λ D = 10 4 , the fading parameters m = 7 , μ = 1 , β = 0.01 , α = 3 , E C = 5 × 10 8 W 2 / 3 and SINR threshold as T = 0 dB. Figure 4 shows that, when κ 0 (in the case of Nakagami and Rayleigh fading), i.e the fading power of dominant components becomes negligible, the C D F decreases, i.e., the needed transmit power becomes large. Since increasing κ reduces the fading severity, the C D F curves shifts to the left, i.e., the transmit power decreases. In addition, as depicted in this figure, we observe that the transmit power CDF curves become likely identical when the parameter κ increases. This result is explained by the fact that, when κ increases, the PDF of the fading channel becomes slowly dependent on this parameter. Figure 5 depicts the transmit power CDF for different values of the parameter m. In this experimentation, we worked with the same parameters as above, with κ = 10 . We noticed that, for large values of m, the C D F curve shifts to the left side, i.e., for a specified power, the C D F becomes large when m grows, which means that the required transmit power decreases. The reason behind this is that lower values of m means a larger probability of having low S I N R values, i.e., a larger fading severity. When m grows, the effect of line of sight (LOS) fluctuation vanishes and the S I N R values tend to be more concentrated around its mean value (see Figure 4 in [15]).
Figure 4. CDF of the transmit power for different values of κ .
Figure 5. CDF of the transmit power for different values of m.
In the last assessment, we considered the energy harvesting in the transmitter devices. The used parameters were as follows: β = 1 , α = 4 , τ = 0.99 , E C = 5 × 10 3 W 1 / 2 and T = 10 dB; the channel power is considered as exponential, with mean σ = 1 , as the channel is assumed to be Rayleigh. Figure 6 depicts the variation in the user transmission probability (the parameter ρ ). As represented, the simulation and analytic results match well. We can observe from this figure that the values of ρ are much less than 1. However, when the cell-users’ density increases, the user transmission probability increases since more cellular equipments are present in the neighborhood of devices; then, they can harvest more energy that they exploit to transmit data. Considering the harvested energy, it appears more interesting to gather energy from the down-link channel rather than the up-link one since the base station can transmit energy with relatively higher power compared to users’ equipment, and then more energy can be harvested.
Figure 6. D2D user transmission probability ρ vs. λ C .

7. Conclusions

In this work, we derived the transmit power distribution of a D2D communication under a κ - μ shadowed fading channel using stochastic geometry and considering an underlaid situation of spectrum sharing. Exploiting the finding, we derived the transmit power CDF of some special cases of fading channels—Nakagami and Rayleigh—and we also provided a simple-form CDF in the case of na noiseless environment. Based on the case of Rayleigh fading, we investigated the mechanism of harvesting the RF energy for the device transmitter from its cellular interferers. The simulations showed a good correspondence between the analytical and numerical results, which confirms the validity of our analysis.

Author Contributions

Conceptualization, A.B. and O.Z.; methodology, A.B. and O.Z.; validation, A.B., O.Z., H.E.F. and R.S.; formal analysis, A.B.; investigation, A.B.; writing—original draft preparation, A.B., O.Z. and H.E.F.; writing—review and editing, A.B., O.Z., H.E.F. and R.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Shafique, K.; Khawaja, B.A.; Sabir, F.; Qazi, S.; Mustaqim, M. Internet of Things (IoT) for Next-Generation Smart Systems: A Review of Current Challenges, Future Trends and Prospects for Emerging 5G-IoT Scenarios. IEEE Access 2020, 8, 23022–23040. [Google Scholar] [CrossRef]
  2. Porambage, P.; Gur, G.; Osorio, D.P.M.; Liyanage, M.; Gurtov, A.; Ylianttila, M. The roadmap to 6G security and privacy. IEEE Open J. Commun. Soc. 2021, 2, 1094–1122. [Google Scholar] [CrossRef]
  3. Kar, U.N.; Sanyal, D.K. An overview of device-to-device communication in cellular networks. ICT Express 2018, 4, 203–208. [Google Scholar] [CrossRef]
  4. Alnoman, A.; Anpalagan, A. On D2D communications for public safety applications. In Proceedings of the 2017 IEEE Canada International Humanitarian Technology Conference (IHTC), Toronto, ON, Canada, 21–22 July 2017; pp. 124–127. [Google Scholar] [CrossRef]
  5. Goratti, L.; Steri, G.; Gomez, K.M.; Baldini, G. Connectivity and security in a D2D communication protocol for public safety applications. In Proceedings of the 2014 11th International Symposium on Wireless Communications Systems (ISWCS), Barcelona, Spain, 26–29 August 2014; pp. 548–552. [Google Scholar] [CrossRef]
  6. Liu, J.; Kato, N.; Ma, J.; Kadowaki, N. Device-to-Device Communication in LTE-Advanced Networks: A Survey. IEEE Commun. Surv. Tutor. 2014, 17, 1923–1940. [Google Scholar] [CrossRef]
  7. Han, L.; Zhang, Y.; Zhang, X.; Mu, J. Power Control for Full-Duplex D2D Communications Underlaying Cellular Networks. IEEE Access 2019, 7, 111858–111865. [Google Scholar] [CrossRef]
  8. Wen, S.; Zhu, X.; Lin, Z.; Zhang, X.; Yang, D. Energy Efficient Power Allocation Schemes for Device-to-Device(D2D) Communication. In Proceedings of the 2013 IEEE 78th Vehicular Technology Conference (VTC Fall), Las Vegas, NV, USA, 2–5 September 2013; pp. 1–5. [Google Scholar] [CrossRef]
  9. Bulashenko, A.; Piltyay, S.; Demchenko, I. Energy Efficiency of the D2D Direct Connection System in 5G Networks. In Proceedings of the 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, Ukraine, 6–9 October 2020; pp. 537–542. [Google Scholar] [CrossRef]
  10. Nguyen, K.K.; Duong, T.Q.; Vien, N.A.; Le-Khac, N.-A.; Nguyen, M.-N. Non-Cooperative Energy Efficient Power Allocation Game in D2D Communication: A Multi-Agent Deep Reinforcement Learning Approach. IEEE Access 2019, 7, 100480–100490. [Google Scholar] [CrossRef]
  11. Doan, T.X.; Hoang, T.M.; Duong, T.Q.; Ngo, H.Q. Energy Harvesting-Based D2D Communications in the Presence of Interference and Ambient RF Sources. IEEE Access 2017, 5, 5224–5234. [Google Scholar] [CrossRef]
  12. Sun, P.; Shin, K.G.; Zhang, H.; He, L. Transmit Power Control for D2D-Underlaid Cellular Networks Based on Statistical Features. IEEE Trans. Veh. Technol. 2017, 66, 4110–4119. [Google Scholar] [CrossRef]
  13. Paris, J.F. Statistical Characterization of κ-μ Shadowed Fading. IEEE Trans. Veh. Technol. 2014, 63, 518–526. [Google Scholar] [CrossRef]
  14. Goswami, A.; Kumar, A. Statistical Characterization and Performance Evaluation of α-η-μ/Inverse Gamma and α-κ-μ/Inverse Gamma Channels. Wirel. Pers. Commun. 2022, 124, 2313–2333. [Google Scholar] [CrossRef]
  15. Ramirez-Espinosa, P.; Moualeu, J.M.; da Costa, D.B.; Lopez-Martinez, F.J. The α-κ-μ Shadowed Fading Distribution: Statistical Characterization and Applications. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Big Island, HI, USA, 9–13 December 2019. [Google Scholar]
  16. Hunukumbure, M.; Moulsley, T.; Oyawoye, A.; Vadgama, S.; Wilson, M. D2D for energy efficient communications in disaster and emergency situations. In Proceedings of the 2013 21st International Conference on Software, Telecommunications and Computer Networks—(SoftCOM 2013), Split-Primosten, Croatia, 18–20 September 2013; pp. 1–5. [Google Scholar] [CrossRef]
  17. Anamuro, C.V.; Varsier, N.; Schwoerer, J.; Lagrange, X. Simple modeling of energy consumption for D2D relay mechanism. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), Barcelona, Spain, 15–18 April 2018; pp. 231–236. [Google Scholar] [CrossRef]
  18. Shang, B.; Zhao, L.; Chen, K.-C.; Chu, X. Energy Efficient D2D-Assisted Offloading with Wireless Power Transfer, GLOBECOM 2017. In Proceedings of the 2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar] [CrossRef]
  19. Amiri, M.H.Z.; Nazemi, A.M.; Namazi, M.; Amri, K.J.; Amiri, F.Z. Energy Saving in D2D Cellular 6G Networks. In Proceedings of the 2020 10th International Conference on Computer and Knowledge Engineering (ICCKE), Mashhad, Iran, 29–30 October 2020; pp. 676–682. [Google Scholar] [CrossRef]
  20. Zytoune, O.; Fouchal, H.; Zeadally, S. A realistic relay selection scheme for cooperative MIMO networks. Ad Hoc Netw. 2022, 124, 102706. [Google Scholar] [CrossRef]
  21. Atat, R.; Liu, L.; Mastronarde, N.; Yi, Y. Energy Harvesting-Based D2D-Assisted Machine-Type Communications. IEEE Trans. Commun. 2017, 65, 1289–1302. [Google Scholar] [CrossRef]
  22. Lu, X.; Wang, P.; Niyato, D.; Kim, D.I.; Han, Z. Wireless Networks With RF Energy Harvesting: A Contemporary Survey. IEEE Commun. Surv. Tutor. 2015, 17, 757–789. [Google Scholar] [CrossRef]
  23. Atat, R.; Chen, H.; Liu, L. Fundamentals of spatial RF energy harvesting for D2D cellular networks. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar]
  24. Zungeru, A.M.; Ang, L.-M.; Prabaharan, S.R.S.; Seng, K.P. Radio frequency energy harvesting and management for wireless sensor networks. In Green Mobile Devices and Networks; Venkataraman, H., Muntean, G.-M., Eds.; CRC Press: Boca Raton, FL, USA, 2012; Chapter 13; pp. 341–368. [Google Scholar]
  25. Lee, S.; Zhang, R.; Huang, K. Opportunistic wireless energy harvesting in cognitive radio networks. IEEE Trans. Wirel. Commun. 2013, 12, 4788–4799. [Google Scholar] [CrossRef]
  26. Yang, H.H.; Lee, J.; Quek, T.Q.S. Heterogeneous cellular network with energy harvesting-based D2D communication. IEEE Trans. Wirel. Commun. 2016, 15, 1406–1419. [Google Scholar] [CrossRef]
  27. Wang, Y.; Liu, Y.; Wang, C.; Li, Z.; Sheng, X.; Lee, H.G.; Chang, N.; Yang, H. Storage-less and converter-less photovoltaic energy harvesting with maximum power point tracking for internet of things. IEEE Trans. Comput.-Aided Design Integr. Circuits Syst. 2016, 35, 173–186. [Google Scholar] [CrossRef]
  28. Zeb, H.; Gohar, M.; Ali, M.; Rahman, A.U.; Ahmad, W.; Ghani, A.; Choi, J.-G.; Koh, S.-J. Zero Energy IoT Devices in Smart Cities Using RF Energy Harvesting. Electronics 2023, 12, 148. [Google Scholar] [CrossRef]
  29. Luo, Y.; Pu, L.; Lei, L. Impact of Varying Radio Power Density on Wireless Communications of RF Energy Harvesting Systems. IEEE Trans. Commun. 2021, 69, 1960–1974. [Google Scholar] [CrossRef]
  30. Oulcaid, M.; El Fadil, H.; Njili, S.; Zytoune, O.; Bajit, A. Experimental Implementation of a Wireless Communication System for Electric Vehicle WPT Charger. E3S Web Conf. 2022, 351, 01006. [Google Scholar] [CrossRef]
  31. Sun, C.; Alemseged, Y.D.; Tran, H.N.; Harada, H. Transmit Power Control for Cognitive Radio Over a Rayleigh Fading Channel. IEEE Trans. Veh. Technol. 2010, 59, 1847–1857. [Google Scholar] [CrossRef]
  32. Erturk, M.C.; Mukherjee, S.; Ishii, H.; Arslan, H. Distributions of Transmit Power and SINR in Device-to-Device Networks. IEEE Commun. Lett. 2013, 17, 273–276. [Google Scholar] [CrossRef]
  33. Banagar, M.; Maham, B.; Popovski, P.; Pantisano, F. Power Distribution of Device-to-Device Communications in Underlaid Cellular Networks. IEEE Commun. Lett. 2016, 5, 204–207. [Google Scholar] [CrossRef]
  34. Boumaalif, A.; Zytoune, O. Power Distribution of Device-to-Device Communications Under Nakagami Fading Channel. IEEE Trans. Mob. Comput. 2022, 21, 2158–2167. [Google Scholar] [CrossRef]
  35. ElHalawany, B.M.; Jameel, F.; da Costa, D.B.; Dias, U.S.; Wu, K. Performance Analysis of Downlink NOMA Systems Over κ-μ Shadowed Fading Channels. IEEE Trans. Veh. Technol. 2020, 69, 1046–1050. [Google Scholar] [CrossRef]
  36. Lopez-Martinez, F.J.; Paris, J.F.; Romero-Jerez, J.M. The κ-μ Shadowed Fading Model With Integer Fading Parameters. IEEE Trans. Veh. Technol. 2017, 66, 7653–7662. [Google Scholar] [CrossRef]
  37. Schilcher, U.; Toumpis, S.; Haenggi, M.; Crismani, A.; Brandner, G.; Bettstetter, C. Interference Functionals in Poisson Networks. IEEE Trans. Inf. Theory 2016, 62, 370–383. [Google Scholar] [CrossRef]
  38. Andrews, J.G.; Baccelli, F.; Ganti, R.K. A Tractable Approach to Coverage and Rate in Cellular Networks. IEEE Trans. Commun. 2011, 59, 3122–3134. [Google Scholar] [CrossRef]
  39. Moreno-Pozas, L.; Lopez-Martinez, F.J.; Paris, J.F.; Martos-Naya, E. The κ-μ Shadowed Fading Model: Unifying the κ-μ and η-μ Distributions. IEEE Trans. Veh. Technol. 2016, 65, 9630–9641. [Google Scholar] [CrossRef]
  40. Drayson Technologies. RF Energy Harvesting for the Low Energy Internet of Things. 2015, pp. 1–7. Available online: http://www.getfreevolt.com (accessed on 8 May 2012).
  41. Powell, M.J.D. A Fortran Subroutine for Solving Systems of Nonlinear Algebraic Equations. In Numerical Methods for Nonlinear Algebraic Equations; Rabinowitz, P., Ed.; Gordon and Breach: London, UK, 1970; Chapter 7. [Google Scholar]
  42. Stoyan, D.; Kendall, W.; Mecke, J. Stochastic Geometry and Its Applications, 3rd ed.; John Wiley & Sons: Hoboken, NJ, USA, 2013. [Google Scholar]
  43. Foschini, G.J.; Miljanic, Z. A Simple Distributed Autonomous Power Control Algorithm and its Convergence. IEEE Trans. Veh. Technol. 2002, 42, 641–646. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.