Next Article in Journal
Feature Importances: A Tool to Explain Radio Propagation and Reduce Model Complexity
Next Article in Special Issue
Improved Networks Routing Using an Arrow-Based Description
Previous Article in Journal
Hybrid Multi-Antenna Techniques for V2X Communications—Prototyping and Experimentation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Differential Evolution in Waveform Design for Wireless Power Transfer

by
Pavlos Doanis
1,*,†,
Achilles D. Boursianis
1,†,
Julien Huillery
2,†,
Arnaud Bréard
2,†,
Yvan Duroc
2,† and
Sotirios K. Goudos
1,*,†
1
School of Physics, Aristotle University of Thessaloniki, 54124 Thessaloniki, Greece
2
Ampère UMR5005, Université de Lyon, École Centrale de Lyon, Université Claude Bernard Lyon 1, INSA Lyon, CNRS, F-69134 Ecully, France
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Telecom 2020, 1(2), 96-113; https://doi.org/10.3390/telecom1020008
Submission received: 1 June 2020 / Revised: 9 July 2020 / Accepted: 24 July 2020 / Published: 4 August 2020
(This article belongs to the Special Issue Modern Circuits and Systems Technologies on Communications 2020)

Abstract

:
The technique of transmitting multi-tone signals in a radiative Wireless Power Transfer (WPT) system can significantly increase its end-to-end power efficiency. The optimization problem in this system is to tune the transmission according to the receiver rectenna’s nonlinear behavior and the Channel State Information (CSI). This is a non-convex problem that has been previously addressed by Sequential Convex Programming (SCP) algorithms. Nonetheless, SCP algorithms do not always attain globally optimal solutions. To this end, in this paper, we evaluate a set of Evolutionary Algorithms (EAs) with several characteristics. The performance of the optimized multi-tone transmission signals in a WPT system is assessed by means of numerical simulations, utilizing a simplified Single Input Single Output (SISO) model. From the model evaluation, we can deduce that EAs can be successfully applied to the waveform design optimization problem. Moreover, from the presented results, we can derive that EAs can obtain the optimal solutions in the tested cases.

1. Introduction

A lot of research has been recently carried out on the Internet of Things (IoT) concept. IoT is an evolutionary approach that is promising to make a great impact on everyday life and business activities. It is believed that its wide deployment will also bring economic growth, but this requires the advancement of various enabling technologies [1]. One of these technologies is Radio Frequency (RF) Wireless Power Transfer (WPT), which is used for powering up low-power devices without the need of batteries or cables [2,3,4].
In a traditional radiative WPT system, a transmitter device generates a continuous electromagnetic field, which transmits power across the medium to a receiver device (rectenna). However, the transmission of pulsed electromagnetic fields that demonstrate higher peak-to-average power ratio (PAPR) has proved to be advantageous. Pulsed wave signals are multi-tone signals that exploit the nonlinear behavior of the receiver’s rectifying circuit and increase its RF-DC conversion efficiency [5,6].
When the propagation between the transmitter and the receiver is characterized by a multipath channel function, Channel State Information (CSI) should be taken into account for the design of multi-tone signals. Towards this direction, multi-tone waveforms constructed by Time Reversal (TR) processing are proposed for WPT in [7,8]. TR waves are designed in a predetermined way, according to the CSI, and are capable of focusing on the receiver with the highest peak voltage. Consequently, they exploit both the multipath propagation channel and the nonlinear behavior of the receiver’s rectifier. The same waveform design technique was proposed in [9,10] as an Adaptive Matched Filter technique and Frequency-Maximal Ratio Transmission technique, respectively.
Another advancement in waveform design for WPT is the optimization of multi-tone waveforms according to an objective function. This function incorporates both the CSI and the rectifier’s nonlinear behavior through the analytical models of a WPT system and a simple rectenna introduced in [9]. It has been verified by numerical simulations that the transmission of these waveforms is the most efficient way to transfer power wirelessly [9]. An improvement of the objective function was proposed in [10] for the same optimization problem. The authors in both of these publications denoted that the non-convex nature of the problem is the cause of obtaining non-guaranteed globally optimal solutions by the proposed Sequential Convex Programming (SCP) methods. Many works utilizing the basic framework of [9] for waveform optimization have been published. Experimental verification of the observations made in [9] is provided in [11,12]. Low complexity optimization methods are proposed in [10,13,14]. An extension of the analytical model for application in wirelessly powered backscatter communications is introduced in [15]. In such systems, the Signal to Noise Ratio (SNR) value of the backscattered signal is equally important and is taken into consideration by adding one more constraint to the problem. The model is further extended by considering multi-tone waveforms with modulated carriers and adding a constraint to ensure a minimum rate of information transfer [16]. The waveform optimization problem has been examined for different types of systems like Single Input Single Output (SISO) in [9,10,15], Multiple Input Single Output (MISO) in [9,12,13,16], multiple users MISO in [9,13], Multiple Input Multiple Output (MIMO) in [9] and multi-receiver SISO in [17].
In artificial intelligence, Evolutionary Algorithm (EA) is a subset of evolutionary computation, i.e., a population-based metaheuristic optimization algorithm. EAs are commonly used in real-world problems and are capable of tracking the global optimum in challenging objective functions. They are equipped with mechanisms inspired by biological evolution, such as mutation, crossover, and selection, to adapt the search to the objective function’s landscape and, at the same time, to prevent convergence to a local optimum. EAs have a stochastic direct-search nature; thus they cannot ensure globally optimal solutions. However, there are many different algorithms available and each of them is suitable for different types of optimization problems.
One of the most widely known evolutionary algorithms is Differential Evolution (DE) [18]. The legacy scheme of DE algorithm is controlled by several parameters. The optimal values of these parameters differ from problem to problem and even from one stage of the search process to another [19]. Tuning DE’s control parameters before its application to a specific problem is an important and time-consuming task. As a result, the overall performance of this algorithm is highly engaged to the values of the control parameters. Researchers have put a lot of effort to develop algorithms that automatically adapt these control parameters during the search process. Two of the algorithms that have been proposed towards this direction are Composite Differential Evolution (CoDE) [20] and Success History based Adaptive DE with Linear population size reduction (L-SHADE) [21]. On the other hand, Jaya [22] is a well-promising algorithm for different types of optimization problems, since it does not have any algorithm-specific control parameters to be tuned.
Considering all the above, the optimization of the transmitted waveforms, based on a simple rectenna model and the channel state information is a promising technique to improve the overall power transfer efficiency in any WPT system. The objective of this paper is to apply various DE algorithms (DE, CoDE, L-SHADE) and the Jaya algorithm to optimize the waveform design of a WPT system and to assess the performance of the selected algorithms compared to the SCP-QCLP (Quadratically Constrained Linear Programming) method used in [10].
The novelty of this work lies in the examination of feasibility to apply various DE and Jaya algorithms in this optimization problem. To this end, there is a detailed description of the mechanisms that need to be incorporated into these algorithms for their successful implementation. These mechanisms concern the enforcement of boundary constraints. Also, a rigorous comparison between the examined algorithms is presented, taking into account not only their ability to track the optimal value of the objective function, but also their convergence speed for the tested cases.
The paper is organized as follows. In Section 2, we describe the WPT system model, including the structure of the multi-tone waveforms, the propagation channels, the rectenna circuit model, and the selected objective function. Section 3 depicts the tested EAs and the modifications needed for their application in this optimization problem. Finally, In Section 4 and Section 5, we outline the derived results and the conclusions of the paper, accordingly.

2. Wireless Power Transfer System Model

We consider a Single Input Single Output (SISO) WPT system model. This model corresponds to the simplest utilized WPT system, consisting of a transmitter, a multipath propagation channel, and a receiver rectenna (Figure 1). The wireless transfer of the power is obtained by generating and transmitting an RF signal which, after propagating across the medium, is received and rectified by the receiver rectenna (rectifier + antenna) to supply an electrical load. Hence, the objective is to design a waveform s ( t ) , such that the DC power at the output of the rectenna ( P o u t ) is maximized.

2.1. Waveforms Structure

The waveform signals that have been utilized in this paper incorporate multiple sub-carriers evenly-spaced in the frequency domain. These signals are pulsed waves of a periodic form with a pulse period of T o = 1 Δ f , considering that the frequency space between two adjacent tones is Δ f . Each transmitted signal can be expressed in the time domain by:
s ( t ) = R n = 1 N a n e j θ n e j 2 π f n t = n = 1 N a n cos ( 2 π f n t + θ n )
where n is a positive integer, N 1 is the total number of sub-carriers, and a n , θ n , f n are the amplitude in Volts, phase in radians, and frequency in Hz, of the n th sub-carrier respectively. We organize the a n , θ n , f n values in vectors of the following form:
a = [ a 1 , a 2 , , a N ] θ = [ θ 1 , θ 2 , , θ N ] f = [ f 1 , f 2 , , f N ]
According to Parseval’s theorem, if S ( f ) is the Fourier transform of s ( t ) , then the average power of s ( t ) in Watts can be calculated as:
P s = 1 T o 0 T o s 2 ( t ) d t = + | S ( f ) | 2 d f = n = 1 N a n 2 2
The definition of the waveform’s central frequency ( f c ), bandwidth (B), and pulse period ( T o ) determines the total number of sub-carriers and the associated f n frequencies of the signal. The minimum and maximum frequency tones in the spectrum are limited by f m i n = f c B 2 and f m a x = f c + B 2 , accordingly. The resulted frequencies f n of the sub-carriers correspond to the multiples of 1 / T o in the interval [ f m i n , f m a x ] .
To compute the received signal at the input of the rectenna, the frequency response function of the propagation across the medium is required. For a selected frequency f n , this can be expressed by:
T F n = b n e j ψ n
where b n is the amplitude and ψ n is the phase of the propagation channel’s frequency response, respectively. These values can be also organized in vectors b and ψ accordingly. If we presume that the propagation channel is linear time-invariant, the incident wave at the input of the rectenna r ( t ) is given by:
r ( t ) = R n = 1 N a n b n e j θ n e j ψ n e j 2 π f n t = n = 1 N a n b n cos ( 2 π f n t + θ n + ψ n )

2.2. Propagation Channels

A realistic testbed of the propagation channel was fabricated in a laboratory. Since the use of CSI is more practical in a multipath propagation environment, we developed complex channels by placing a rectangular box of highly reflective surfaces and various metal obstacles between the transmitter and the receiver. A set of VNA measurements were conducted to characterize four different propagation channels, based on the four different sites of the receiver antenna, respectively (Figure 2). The obtained data by the VNA measurements were utilized to compute b and ψ depending on the waveform characteristics.

2.3. Rectenna Model

The utilized rectenna model [9,10] is depicted in Figure 3. It comprises an antenna, a single diode rectifier, and a load. The receiver antenna model also includes a voltage source v s ( t ) and a series impedance ( R s = 50   Ω ). The rectifier’s input impedance R i n , as well as its input voltage v i n ( t ) is also depicted in Figure 3. In order to simplify the rectenna model, a lossless antenna and a perfect matching between the antenna and the rectifier ( R s = R i n = 50   Ω ) is considered. Moreover, the antenna noise and the diode’s series resistance are omitted. The value of the load is set to R L = 1.6   k Ω and the value of the capacitance C is equal to C = 50 T o R L , resulting in a mitigation of the output fluctuation v o u t .

2.4. Objective Function

The optimization problem in hand is to design a waveform s ( t ) (find the corresponding a and θ ) that maximizes the DC power delivered to the load R L , for a specific constraint in the average power of the designed waveform. For this problem, we apply the objective function that is utilized in [10], which is based on Kirchhoff’s circuit laws of the equivalent circuit depicted in Figure 3. The assumption of a lossless antenna, perfect matching between the antenna and the rectifier, ideal diode and negligible fluctuation of the output voltage, led to a tractable nonlinear rectenna model and made the derivation of the objective function possible [9,10]. According to [10], the formulation of the objective function can be expressed as:
F ( a , θ ) = 1 T o 0 T o e R s r ( t ) η V t d t
which is subject to:
a n 0 and n = 1 N a n 2 2 P t
Based on [10], the maximization of (6) with respect to (7) maximizes the DC power delivered to the load. In (6), we set η = 1.05 as the ideality factor of the diode and V t = 25.86 mV its thermal voltage. Also, we denote as P t in (7), the power constraint imposed on the designed waveform in Watts.
For the numerical computation of the integral in (6), we apply the 2-point Newton-Cotes formula [10]. To this end, we set the sampling frequency at f s = 20 f c . Considering that the sampling period is given by Δ t = 1 / f s , the number of sub-intervals by Q = T o / Δ t , and Q is rounded to the nearest integer that is Q , (6) derives to:
F ( a , θ ) = 1 Q q = 1 Q e R s n = 1 N a n b n c o s ( 2 π f n q Δ t + θ n + ψ n ) η V t
The optimal selection of the phases θ n in the transmitted signal are defined as θ n = ψ n [9]. Consequently, if we choose a specific propagation channel and a set of f c , B, and T o values, the optimization problem confines to obtain the optimal value of the vector of amplitudes a that maximizes (8) with respect to the constraint in (7).

3. Evolutionary Algorithms

In a typical EA like DE, an initial random population of candidate solutions to the underlying optimization problem is evolved by applying various mathematical operators to the population’s individuals. Then, the generated solutions that demonstrate better fitness to their predecessors substitute them. The same procedure of generating new solutions and performing selection is repeated until a stopping criterion is fulfilled. The fittest individual that has survived through this process is the proposed solution to the optimization problem.

3.1. Differential Evolution

The iterations in DE algorithm are called generations (g) and the termination criterion can be set by selecting a maximum number of generations ( g m a x ). Alternatively, the termination criterion can be a maximum number of objective function evaluations ( F E m a x ). The parameter vectors are called population vectors or individuals and are denoted by x i , g , where i = 1 , 2 , , N P and g = 1 , 2 , , g m a x . N P is called population size and it is one of the three control parameters of DE. Each vector x i , g consists of D elements that correspond to the decision variables of the optimization problem and are denoted by x j , i , g , where j = 1 , 2 , , D . Consequently, the dimensionality of the optimization problem is D. The population vectors in generation g are usually organized in a population matrix denoted by P x , g , which is given in (9).
P x , g = x 1 , g x N P , g = x 1 , 1 , g x D , 1 , g x 1 , N P , g x D , N P , g
The first step in DE algorithm is the initialization of NP individuals. The population vectors of the first generation are initialized randomly inside the feasible search space. Consequently, when the decision variables are subject to some constraints, these constraints should be taken into account. After the initialization phase, the algorithm enters the main loop, which consists of three different operations called mutation, crossover, and selection.
Mutation is the operation that generates mutant vectors. A mutant vector is created by perturbing one of the population vectors with the weighted difference of two others. In this way, DE exploits information from different individuals to direct the search. During mutation, each x i , g serves once as a target vector and a corresponding mutant vector v i , g is generated by:
v i , g = y i , g + F · ( x r 2 , g x r 3 , g )
where y i , g is called the base vector. In the classic DE version it is y i , g = x r 1 , g . Indices r 1 , r 2 and r 3 are randomly chosen every time a mutant vector is generated, under the condition that r 1 , r 2 , r 3 { 1 , 2 , , N P } and r 1 r 2 r 3 i . The scale factor (SF), denoted by F, is one of the control parameters of DE. It is always > 0 and while there is no upper limit, it is rarely > 1 [23]. We should note that (10) describes the mutation strategy in the classic version of DE, but many other different mutation strategies have been introduced in the literature.
Crossover is the operation responsible for the diversity enhancement of the population. During crossover, a new trial vector u i , g is generated for each target vector by combining some parameters of v i , g with some parameters of x i , g . This operation is controlled by a control parameter called Crossover Rate ( C R ), which may take values in the range [ 0 , 1 ] . For the generation of a trial vector, a random number in the range ( 0 , 1 ) is generated for each j. If this number is smaller than or equal to C R , the trial vector inherits its j th parameter from the corresponding mutant vector, otherwise, it retains the j th parameter of the target vector. Moreover, a random index j r a n d { 1 , 2 , , D } is generated for each i and the new trial vector inherits its j th = j r a n d parameter from the corresponding mutant vector. This is to ensure that u i , g takes at least one element from v i , g . The crossover operation is described by:
u j , i , g = v j , i , g if r a n d j ( 0 , 1 ) C R or j = j r a n d x j , i , g otherwise
At this point, we should note that various other crossover strategies have been also introduced in the literature.
Selection is the operation of choosing between a trial vector and the corresponding target vector. The chosen vector “survives” and continues in the next generation. The selection process is very simple in DE as the vector with the lowest fitness value will survive in a minimization problem or the vector with the largest fitness value will survive in a maximization problem. For a maximization problem, the selection operation is described by:
x i , g + 1 = u i , g if f ( u i , g ) f ( x i , g ) x i , g otherwise

3.2. CoDE, L-SHADE, Jaya Algorithms

In this subsection, we are going to highlight the most important characteristics of CoDE, L-SHADE, and Jaya. We are not going to give a full description of the algorithms since their basic structure is similar to DE.
CoDE is an algorithm that is based on DE and utilizes the distinct attributes of different trial vector generation strategies and control parameter values. The term trial vector generation strategy refers to the selected mutation and crossover strategies. The authors in [20] utilized other researchers’ experiences of applying the DE algorithm in various problems to choose three trial vector generation strategies and three pairs of control parameter values ( F , C R ) that demonstrate distinct advantages. Each of them is suitable for different kinds of problems and different stages of the optimization process. The novelty in CoDE is that each one of the trial vector generation strategies is combined randomly with one of the ( F , C R ) pairs to produce three different trial vectors for each target vector. The three trial vectors compete with each other before competing with the target vector. This gives CoDE its adaptive capabilities and enables its effectiveness for a variety of optimization problems. One may say that CoDE uses adaptive control both for the control parameters and the trial vector generation strategies. The only control parameter value that needs to be adjusted is the population size.
L-SHADE is also based on the DE algorithm and it automatically adapts its control parameter values during the search process. These values, which differ between individuals, are indicated as F i , C R i , and are adapted according to the control parameter values of the trial vectors that have successfully survived selection in past generations. L-SHADE features a modified mutation scheme that directs the population towards the top p × N P individuals, where p ( 0 , 1 ) . Also, an optional external archive contains former target vectors that have failed to survive selection and they are used in a way that enhances the diversity of the current population. Finally, L-SHADE incorporates a feature called Linear Population Size Reduction (LPSR), meaning that the population size N P is continuously reduced from generation to generation according to a linear function. Hence, L-SHADE automatically adjusts not only the F i , C R i control parameters, but the population size as well. The control parameters that need to be provided in L-SHADE are the mutation scheme parameter (p), the size of the external archive (A), the size of the historical memory (H), the initial population size ( N P i n i t ), and the final population size ( N P m i n ).
Jaya is not classified to a DE variant; nonetheless it is also a population based heuristic algorithm. It has only one mechanism for perturbing the population vectors and generating new ones. The basic concept is that the generated solutions move towards the individual with the best fitness and away from the one with the worst. Jaya is a very simple algorithm and its only control parameter is the population size.

3.3. Modifications for Application in Waveform Design

Here we describe the necessary modifications made in the original versions of the algorithms to apply them in the waveform design for the WPT problem. These include the initialization of the population and the enforcement of boundary constraints.
In the optimization problem of waveform design for WPT, the population vectors of any EA coincide with the a vectors, while the dimensionality of the problem is equal to the waveform’s total number of sub-carriers ( D = N ). The population vectors of the first generation are initialized randomly inside the feasible solution space. According to (7), the minimum value of a n is 0. On the other hand, the maximum value is 2 P t , considering a scenario where all the available power would be allocated in only one of the sub-carriers. Hence, each element of the population vectors initially takes a random value between 0 and 2 P t . Then, the vectors that violate the transmit power constraint are normalized so that the average transmitted power for each one of them is P t before entering the main loop of the algorithm. Considering that each x i , g represents a vector of amplitudes a , the normalization is accomplished by multiplying the invalid vectors with a term Z i that is calculated individually for each one of them:
x i , 1 = Z i · ( x i , 1 ) i n v a l i d if j = 1 D ( x j , i , 1 2 ) i n v a l i d 2 > P t Z i = P t j = 1 D ( x j , i , 1 2 ) i n v a l i d 2
The invalid vectors generated during mutation and crossover operations in DE are also substituted by vectors that lie inside the feasible solution space. This process is applied in two steps right after the crossover operation in a generation basis. In the first step, the negative valued elements of each trial vector are substituted by the respective elements of the corresponding base vector multiplied by a uniformly distributed random number in the range ( 0 , 1 ) :
u j , i , g = r a n d j ( 0 , 1 ) · y j , i , g if u j , i , g < 0
The random number r a n d j ( 0 , 1 ) is generated individually for each element substitution. In the second step, the trial vectors that violate the transmit power constraint are normalized in the same way as described earlier:
u i , g = C i · ( u i , g ) i n v a l i d if j = 1 D ( u j , i , g 2 ) i n v a l i d 2 > P t C i = P t j = 1 D ( u j , i , g 2 ) i n v a l i d 2
Algorithm 1 summarizes the pseudocode of DE in the WPT optimization problem. The rest of the algorithms are modified and applied in the same manner.
Algorithm 1: Pseudocode of DE in WPT problem
  • Input: N P , F , C R , F E m a x , f c , B , T 0 , P t , R s , I s , V t , η , R L
  • 1: Calculate f and N according to f c , B , T 0
  • 2: Import b and ψ from the VNA measurements of the specific propagation channel
  • 3: Set θ = ψ
  • 4: // INITIALIZATION PHASE
  • 5: D = N
  • 6: g = 1
  • 7: F E = 0
  • 8: Initialize P x , g with random values: 0 < x j , i , g < 2 P t
  • 9: for i = 1 to N P do
  • 10:         Normalize invalid vectors using (13)
  • 11:         Calculate the objective function F ( x i , g , θ )
  • 12:          F E = F E + +
  • 13: end for
  • 14: // MAIN LOOP
  • 15: while F E < F E m a x do
  • 16:         // For each target vector generate a trial vector
  • 17:          for i = 1 to N P do
  • 18:                   Generate v i , g using (10)
  • 19:                   Generate u i , g using (11)
  • 20:         end for
  • 21:         // Cope with the invalid vectors
  • 22:         for  i = 1 to N P ; do
  • 23:                   Apply (14) and (15)
  • 24:                   Calculate the objective function F ( u i , g , θ )
  • 25:                    F E = F E + +
  • 26:                   // SELECTION
  • 27:                   if  F ( u i , g , θ ) F ( x i , g , θ ) then
  • 28:                              x i , g + 1 = u i , g
  • 29:                   end if
  • 30:         end for
  • 31:          g = g + +
  • 32: end while
  • Output: The population vector of the last generation with the best fitness value ( x b e s t , g m a x )

4. Results

4.1. Application of Algorithms

In this section, several algorithms (DE, CoDE, L-SHADE, Jaya, and SCP-QCLP) are applied in the waveform design for the WPT problem. The objective is to design multi-tone signals with f c = 910 MHz and B = 100 MHz . We set T o = 20, 40, 80, 160, 320 ns, which lead to waveforms with N = 2, 4, 8, 16, 32 sub-carriers respectively. The propagation channels examined are the four channels described in Section 2.2. Consequently, 20 different cases are assessed. The power constraint in the designed waveform is set to P t = 30 dBm . This choice leads to a received signal r ( t ) with average power that varies from 14.4 dBm to 20.6 dBm , depending on the channel and the waveform. We consider this as a reasonable choice taking into account that in [9,10] the examined transmitted signals delivered with a received signal power of 20 dBm and 11.67 dBm respectively. Moreover, according to [24], a received signal of 10   μ W to 100   μ W is enough to power a modern wireless low power device. We note that the power of the finally transmitted signal is higher than 30 dBm since the utilized propagation channels include an amplifier and antenna before its transmission. Each algorithm is applied 50 times per case. For each obtained solution a , we calculate the rectified DC power using the appropriate expressions derived by the rectenna model of Figure 3 and a bisection method as described in [10]. For this calculation we set the sampling frequency at f s = 100 f c in order to increase the accuracy in the numerical computation of the integral. From the obtained data, we compute the average rectified DC power and the corresponding standard deviation over 50 runs for each algorithm.
Before the execution of each of the applied EA algorithms, the control parameter settings, as well as the termination criteria used in each case, are determined. Table 1 lists the termination criteria and the optimal control parameter values (F, C R ) for DE. These values are obtained by conducting a parametric study for the 5 cases of the second propagation channel, whereas the population size is set to N P = 10 D . For the CoDE algorithm, the population size was set equal to D, except for the cases of D < 6 , where it is set to N P = 6 . This limitation derives from the minimum required number of population vectors in CoDE, which is 6. In L-SHADE, we set the mutation scheme parameter to p = 0.11 , the size of the external archive to A = 1.4 N P , the size of the historical memory to H = 5 , the initial population size to N P i n i t = 18 D , and the final population size to N P m i n = 4 . Finally, in Jaya, we set the population size to N P = 10 D .

4.2. Performance Comparison

The average rectified DC power for the waveforms designed by the algorithms under test is listed in Table 2. We can easily derive that all algorithms yield very similar results. Considering the performance of SCP-QCLP as the reference, we will compare the other algorithms with it. In DE, we observe a maximum percentage decrease of 2.96% in channel 1 for T o = 320 ns. This is a slight performance deterioration that could be explained by the fact that the tuning of F and C R parameters was based only on the characteristics of the second propagation channel. However, taking into consideration the overall outcome, the selected values of F and C R give satisfactory results for all the channels under test. Jaya’s performance is just slightly deteriorated for N = 32 if we take into account the maximum percentage decrease of 0.66% in channel 4. CoDE and L-SHADE generally score values of a very slight improvement in the rectified DC power compared to SCP-QCLP, with a maximum of around 0.06% in channel 4 for T o = 40 ns. However, this improvement is trivial and it can be attributed to the value of the termination criterion applied in SCP-QCLP mode (it was set to = 10 3 as in [10]).
Table 3 lists the standard deviation values of the rectified DC power over 50 runs for each algorithm as they presented in Table 2. We can easily conclude that these values are quite low compared to the corresponding average ones. Note that SCP-QCLP should normally demonstrate zero standard deviation in any of the cases since it is not a stochastic algorithm and it is developed to converge always to the same solution. However, the observed values for SCP-QCLP are not exactly zero, due to the roundoff error of floating-point arithmetic. Table 4 and Table 5 present the best and worst values of rectified DC power detected by each algorithm. We can derive that the best values are quite similar to the worst, as expected from the corresponding low standard deviation. Also, we should remark that EAs did not detect any solution in any of the cases to demonstrate more than 0.06% increase in the rectified DC power compared to SCP-QCLP.
We should point out that the SCP methods used in [9,10] make use of some techniques to transform the original non-convex objective function into a convex one that approximates the problem and can be solved iteratively until convergence. Also, in these methods, the search starts from only one point in the solution space, which could easily lead to obtaining a locally optimal solution. On the other hand, in this paper, we employ evolutionary algorithms using the original non-convex objective function. EAs initially sample randomly the solution space and utilize a population of solutions to guide the search. Furthermore, they are equipped with mechanisms, like the crossover, to enhance the population’s diversity and prevent convergence to a local optimum. However, convergence to a globally optimal solution is still not guaranteed. We should also note that the four EAs tested in this paper have different characteristics and are suitable for different types of problems. Considering all the above, the results indicate that the obtained solutions may be the globally optimal ones.
Finally, in Figure 4 and Figure 5 we exhibit a visual illustration of the waveforms designed by EA algorithms in this work.

4.3. Convergence Plots

The assessment of the derived results so far has exhibited that among the tested EAs, no one stands out for yielding superior solutions. The next step for the evaluation of their performance is to check which one of them converges within a lower number of function evaluations. This can be achieved by examining the convergence plots of the algorithms in each one of the cases. These plots are generated by processing the already obtained data and depict the mean fitness value over 50 runs as a function of objective function evaluations (Figure 6, Figure 7, Figure 8 and Figure 9).
By observing the convergence plots for all channels and waveforms, we could say that CoDE algorithm converges slightly faster or at least equally fast in most of the cases compared to the other competitors. It seems that the adaptive nature of CODE makes it suitable for different problems. An exception is detected in Channel 1 for B = 100   MHz and T o = 40 ns. The superiority of CoDE’s convergence speed is more apparent for a larger number of sub-carriers ( N = 16 , N = 32 ). On the other hand, Jaya performs satisfactorily for N = 4 and N = 8 , yet poorly for N = 16 and N = 32 , probably due to its greedy vector generation strategy. Finally, DE and L-SHADE demonstrate quite similar behavior, as they require a larger number of function evaluations for convergence than CODE and Jaya for N = 4 and N = 8 , while they converge faster than Jaya and slower than CoDE for N = 16 or N = 32 .

5. Conclusions

In this paper, we evaluated the application of EAs in the problem of optimal waveform design for WPT systems. In detail, we applied various algorithms (DE, CoDE, L-SHADE, and Jaya) for the optimization of the transmitted multi-tone waveforms. A SISO WPT system was utilized and a multipath propagation channel was implemented. From the derived results, EAs seem to successfully obtain the optimal solutions to this non-convex problem, since all four tested algorithms converged to very similar results. However, the differences between the obtained optimal solutions from EAs and the SCP-QCLP algorithm are indiscernible. As a result, we can conclude that the objective function’s landscape for the given propagation channels is not very complicated. Consequentially, the complexity of EAs was not beneficial compared to the SCP-QCLP algorithm for the given optimization problem. Also, the results increase the confidence that the SCP approach can provide optimal waveforms despite its simplicity. Finally, CODE exhibited a slightly better convergence speed compared to the other EA algorithms.
The advantage of using EAs is that they are very flexible and can be used in conjunction with any objective function. To this end, a more realistic model of the rectifier, designed in some simulation software, could be integrated into the objective function. In that case, a charge pump circuit could be used instead of the single diode rectifier. For the given optimization problem, the disadvantage of EAs compared to SCP-QCLP is the longer execution time due to their stochastic nature.
It would be interesting to examine the application of EAs in waveform design for more complex WPT systems (more challenging objective functions). One scenario would be to examine waveform design in systems that comprise multiple transmitter antennas and/or multiple users like in [9,17]. However, in that case, it is expected that the computational time for the calculation of the objective function, and consequently the total execution time, would increase. Another scenario could be to apply EAs in systems that require the joint optimization of WPT and some other characteristic, like SNR [15] or information transfer rate [16]. That would require the modification of EAs by integrating some mechanisms for the enforcement of the additional constraints.
The optimized waveforms demonstrate high PAPR that is beneficial for the receiver rectenna’s RF to DC conversion efficiency, but not for the amplifier used in the transmission. This is because the behavior of common amplifiers is nonlinear for these types of signals. Consequently, in a real-world application, an additional constraint on PAPR should be imposed. In that case, since there is a strong limitation on the possible s n values, it would be interesting to examine if optimizing both s n and ϕ n using EAs could provide some advantages.

Author Contributions

The conceptualization of the paper was done by P.D., A.D.B., J.H., Y.D. and A.B., and P.D. performed the theoretical analysis and the simulations. A.D.B., J.H., Y.D., A.B., and S.K.G. validated the theoretical analysis and simulation results. A.D.B., and S.K.G. supervised the process. All authors analyzed the results, and contributed to writing and reviewing the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Atzori, L.; Iera, A.; Morabito, G. The Internet of Things: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
  2. Carvalho, N.B.; Georgiadis, A.; Costanzo, A.; Rogier, H.; Collado, A.; García, J.A.; Lucyszyn, S.; Mezzanotte, P.; Kracek, J.; Masotti, D.; et al. Wireless Power Transmission: R&D Activities Within Europe. IEEE Trans. Microw. Theory Tech. 2014, 62, 1031–1045. [Google Scholar] [CrossRef]
  3. Duroc, Y.; Vera, G.A. Towards Autonomous Wireless Sensors: RFID and Energy Harvesting Solutions. In Internet of Things; Mukhopadhyay, S.C., Ed.; Springer International Publishing: Cham, Switzerland, 2014; Volume 9, pp. 233–255. [Google Scholar]
  4. Zeng, Y.; Clerckx, B.; Zhang, R. Communications and Signals Design for Wireless Power Transmission. IEEE Trans. Commun. 2017, 65, 2264–2290. [Google Scholar] [CrossRef] [Green Version]
  5. Boaventura, A.S.; Carvalho, N.B. Maximizing DC power in energy harvesting circuits using multisine excitation. In Proceedings of the 2011 IEEE MTT-S International Microwave Symposium, Baltimore, MD, USA, 5–10 June 2011; pp. 1–4. [Google Scholar] [CrossRef]
  6. Trotter, M.S.; Griffin, J.D.; Durgin, G.D. Power-optimized waveforms for improving the range and reliability of RFID systems. In Proceedings of the 2009 IEEE International Conference on RFID, Orlando, FL, USA, 27–28 April 2009; pp. 80–87. [Google Scholar] [CrossRef]
  7. Ibrahim, R.; Voyer, D.; Bréard, A.; Huillery, J.; Vollaire, C.; Allard, B.; Zaatar, Y. Experiments of Time-Reversed Pulse Waves for Wireless Power Transmission in an Indoor Environment. IEEE Trans. Microw. Theory Tech. 2016, 64, 2159–2170. [Google Scholar] [CrossRef]
  8. Zhang, M.; Fang, C.; Doanis, P.; Huillery, J.; Breard, A.; Duroc, Y. Time-Reversal Processing for Downlink-Limited Passive UHF RFID in Pulsed Wave Mode. Antennas Wirel. Propag. Lett. 2019, 18, 2562–2566. [Google Scholar] [CrossRef]
  9. Clerckx, B.; Bayguzina, E. Waveform Design for Wireless Power Transfer. IEEE Trans. Signal Process. 2016, 64, 6313–6328. [Google Scholar] [CrossRef] [Green Version]
  10. Moghadam, M.R.V.; Zeng, Y.; Zhang, R. Waveform optimization for radio-frequency wireless power transfer: (Invited paper). In Proceedings of the 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Sapporo, Japan, 3–6 July 2017; pp. 1–6. [Google Scholar] [CrossRef]
  11. Kim, J.; Clerckx, B.; Mitcheson, P.D. Prototyping and experimentation of a closed-loop wireless power transmission with channel acquisition and waveform optimization. In Proceedings of the 2017 IEEE Wireless Power Transfer Conference (WPTC), Taipei, Taiwan, 10–12 May 2017; pp. 1–4. [Google Scholar] [CrossRef] [Green Version]
  12. Kim, J.; Clerckx, B.; Mitcheson, P.D. Signal and System Design for Wireless Power Transfer: Prototype, Experiment, and Validation. arXiv 2019, arXiv:1901.01156. [Google Scholar] [CrossRef]
  13. Huang, Y.; Clerckx, B. Large-Scale Multiantenna Multisine Wireless Power Transfer. IEEE Trans. Signal Process. 2017, 65, 5812–5827. [Google Scholar] [CrossRef] [Green Version]
  14. Clerckx, B.; Bayguzina, E. Low-Complexity Adaptive Multisine Waveform Design for Wireless Power Transfer. IEEE Antennas Wirel. Propag. Lett. 2017, 16, 2207–2210. [Google Scholar] [CrossRef] [Green Version]
  15. Clerckx, B.; Zawawi, Z.B.; Huang, K. Wirelessly Powered Backscatter Communications: Waveform Design and SNR-Energy Tradeoff. IEEE Commun. Lett. 2017, 21, 2234–2237. [Google Scholar] [CrossRef]
  16. Clerckx, B. Wireless Information and Power Transfer: Nonlinearity, Waveform Design, and Rate-Energy Tradeoff. IEEE Trans. Signal Process. 2018, 66, 847–862. [Google Scholar] [CrossRef] [Green Version]
  17. Kim, K.; Lee, H.; Lee, J. Waveform Design for Fair Wireless Power Transfer With Multiple Energy Harvesting Devices. IEEE J. Sel. Areas Commun. 2019, 37, 34–47, Jan. [Google Scholar] [CrossRef]
  18. Storn, R.; Price, K. Differential Evolution—A Simple and Efficient Heuristic for global Optimization over Continuous Spaces. J. Glob. Optim. 1997, 11, 341–359. [Google Scholar] [CrossRef]
  19. Gämperle, R.; Mülller, S.D.; Koumoutsakos, P. A Parameter Study for Differential Evolution. In Advances in Intelligent Systems, Fuzzy Systems, Evolutionary Computation; WSEAS Press: Interlaken, Switzerland, 2002; pp. 293–298. [Google Scholar]
  20. Wang, Y.; Cai, Z.; Zhang, Q. Differential Evolution With Composite Trial Vector Generation Strategies and Control Parameters. IEEE Trans. Evolut. Comput. 2011, 15, 55–66. [Google Scholar] [CrossRef]
  21. Tanabe, R.; Fukunaga, A.S. Improving the search performance of SHADE using linear population size reduction. In Proceedings of the 2014 IEEE Congress on Evolutionary Computation (CEC), Beijing, China, 6–11 July 2014; pp. 1658–1665. [Google Scholar] [CrossRef] [Green Version]
  22. Venkata Rao, R. Jaya: A simple and new optimization algorithm for solving constrained and unconstrained optimization problems. Int. J. Ind. Eng. Comput. 2016, 7, 19–34. [Google Scholar] [CrossRef]
  23. Price, K.; Storn, R.M.; Lampinen, J.A. Differential Evolution: A Practical Approach to Global Optimization; Springer: Berlin, Germany; New York, NY, USA, 2005. [Google Scholar]
  24. Clerckx, B.; Costanzo, A.; Georgiadis, A.; Carvalho, N.B. Toward 1G Mobile Power Networks: RF, Signal, and System Designs to Make Smart Objects Autonomous. IEEE Microw. Mag. 2018, 19, 69–82. [Google Scholar] [CrossRef]
Figure 1. The applied Wireless Power Transfer system model.
Figure 1. The applied Wireless Power Transfer system model.
Telecom 01 00008 g001
Figure 2. Top view (schematic representation) of the fabricated realistic testbed for conducting VNA measurements in a complex multipath propagation channel. Details of the schematic view include the three-dimensional box interposed between the transmitter and the receiver and the highly reflective metal objects placed randomly inside the box (tinfoil has adhered to its inner walls). The sites of the receiver antenna that correspond to the propagation channels are also marked (in red color) and numbered.
Figure 2. Top view (schematic representation) of the fabricated realistic testbed for conducting VNA measurements in a complex multipath propagation channel. Details of the schematic view include the three-dimensional box interposed between the transmitter and the receiver and the highly reflective metal objects placed randomly inside the box (tinfoil has adhered to its inner walls). The sites of the receiver antenna that correspond to the propagation channels are also marked (in red color) and numbered.
Telecom 01 00008 g002
Figure 3. The equivalent circuit of the rectenna model (left) [9,10]. The same circuit depicting the equivalent impedance R i n due to the rectifier and the load is also shown (right).
Figure 3. The equivalent circuit of the rectenna model (left) [9,10]. The same circuit depicting the equivalent impedance R i n due to the rectifier and the load is also shown (right).
Telecom 01 00008 g003
Figure 4. (a) Waveform of the designed signal s ( t ) in CODE mode for propagation channel 2 and (b) corresponding signal on the rectifier’s input v i n ( t ) . The waveform’s characteristics are f c = 910 MHz, B = 100 MHz and T o = 320 ns.
Figure 4. (a) Waveform of the designed signal s ( t ) in CODE mode for propagation channel 2 and (b) corresponding signal on the rectifier’s input v i n ( t ) . The waveform’s characteristics are f c = 910 MHz, B = 100 MHz and T o = 320 ns.
Telecom 01 00008 g004
Figure 5. (a) Normalized a n amplitudes of the generated signal’s frequency tones in CoDE mode and (b) normalized b n amplitudes of the propagation channel 2 frequency response. The waveform’s characteristics are f c = 910 MHz, B = 100 MHz and T o = 320 ns.
Figure 5. (a) Normalized a n amplitudes of the generated signal’s frequency tones in CoDE mode and (b) normalized b n amplitudes of the propagation channel 2 frequency response. The waveform’s characteristics are f c = 910 MHz, B = 100 MHz and T o = 320 ns.
Telecom 01 00008 g005
Figure 6. Convergence plots for propagation channel 1, B = 100 MHz and (a) T = 40 ns, N = 4, (b) T = 80 ns, N = 8, (c) T = 160 ns, N = 16, (d) T = 320 ns, N = 32.
Figure 6. Convergence plots for propagation channel 1, B = 100 MHz and (a) T = 40 ns, N = 4, (b) T = 80 ns, N = 8, (c) T = 160 ns, N = 16, (d) T = 320 ns, N = 32.
Telecom 01 00008 g006
Figure 7. Convergence plots for propagation channel 2, B = 100 MHz and (a) T = 40 ns, N = 4, (b) T = 80 ns, N = 8, (c) T = 160 ns, N = 16, (d) T = 320 ns, N = 32.
Figure 7. Convergence plots for propagation channel 2, B = 100 MHz and (a) T = 40 ns, N = 4, (b) T = 80 ns, N = 8, (c) T = 160 ns, N = 16, (d) T = 320 ns, N = 32.
Telecom 01 00008 g007
Figure 8. Convergence plots for propagation channel 3, B = 100 MHz and (a) T = 40 ns, N = 4, (b) T = 80 ns, N = 8, (c) T = 160 ns, N = 16, (d) T = 320 ns, N = 32.
Figure 8. Convergence plots for propagation channel 3, B = 100 MHz and (a) T = 40 ns, N = 4, (b) T = 80 ns, N = 8, (c) T = 160 ns, N = 16, (d) T = 320 ns, N = 32.
Telecom 01 00008 g008
Figure 9. Convergence plots for propagation channel 4, B = 100 MHz and (a) T = 40 ns, N = 4, (b) T = 80 ns, N = 8, (c) T = 160 ns, N = 16, (d) T = 320 ns, N = 32.
Figure 9. Convergence plots for propagation channel 4, B = 100 MHz and (a) T = 40 ns, N = 4, (b) T = 80 ns, N = 8, (c) T = 160 ns, N = 16, (d) T = 320 ns, N = 32.
Telecom 01 00008 g009
Table 1. Optimal F, C R values of DE algorithm and termination criteria for waveforms with B = 100 MHz bandwidth.
Table 1. Optimal F, C R values of DE algorithm and termination criteria for waveforms with B = 100 MHz bandwidth.
T o (ns)N FE max (F & CR )
202500(1 & 0.9)
4045000(0.4 & 0.8)
80820,000(0.3 & 0.7)
1601650,000(0.3 & 0.9)
32032200,000(0.1 & 0.7)
Table 2. Summarized results (average rectified DC power in Watts) for DE, CoDE, L-SHADE, Jaya, and SCP-QCLP WPT modes. The values of the table are computed over 50 runs of each algorithm. Four different propagation channels are tested and various multi-tone waveforms with f c = 910 MHz, B = 100 MHz and T o = 20, 40, 80, 160 or 320 ns are applied. The power constraint is set to P t = −30 dBm.
Table 2. Summarized results (average rectified DC power in Watts) for DE, CoDE, L-SHADE, Jaya, and SCP-QCLP WPT modes. The values of the table are computed over 50 runs of each algorithm. Four different propagation channels are tested and various multi-tone waveforms with f c = 910 MHz, B = 100 MHz and T o = 20, 40, 80, 160 or 320 ns are applied. The power constraint is set to P t = −30 dBm.
Ch. No. T o (ns)NDECODEL-SHADEJayaSCP-QCLP
12022.07835 × 10−92.07835 × 10−92.07835 × 10−92.07835 × 10−92.07835 × 10−9
14041.12359 × 10−81.12212 × 10−81.12385 × 10−81.12385 × 10−81.12360 × 10−8
18081.29479 × 10−81.29655 × 10−81.29655 × 10−81.29655 × 10−81.29614 × 10−8
1160162.21553 × 10−82.21555 × 10−82.21555 × 10−82.21535 × 10−82.21524 × 10−8
1320326.42805 × 10−86.62450 × 10−86.62450 × 10−86.60310 × 10−86.62428 × 10−8
22021.20617 × 10−81.20617 × 10−81.20617 × 10−81.20617 × 10−81.20617 × 10−8
24041.38367 × 10−81.38356 × 10−81.38367 × 10−81.38367 × 10−81.38289 × 10−8
28081.96685 × 10−81.96685 × 10−81.96685 × 10−81.96685 × 10−81.96655 × 10−8
2160164.20886 × 10−84.20886 × 10−84.20886 × 10−84.20813 × 10−84.20882 × 10−8
2320321.76232 × 10−71.76295 × 10−71.76295 × 10−71.75677 × 10−71.76295 × 10−7
32023.29904 × 10−83.29904 × 10−83.29904 × 10−83.29904 × 10−83.29903 × 10−8
34043.96863 × 10−83.96863 × 10−83.96863 × 10−83.96863 × 10−83.96848 × 10−8
38087.22309 × 10−87.23788 × 10−87.23788 × 10−87.23788 × 10−87.23565 × 10−8
3160162.34189 × 10−72.34189 × 10−72.34189 × 10−72.34118 × 10−72.34189 × 10−7
3320321.21622 × 10−61.21802 × 10−61.21802 × 10−61.21246 × 10−61.21802 × 10−6
42022.11492 × 10−82.11492 × 10−82.11492 × 10−82.11492 × 10−82.11491 × 10−8
44043.03277 × 10−83.03263 × 10−83.03277 × 10−83.03277 × 10−83.03080 × 10−8
48088.17112 × 10−88.18408 × 10−88.18408 × 10−88.18408 × 10−88.18222 × 10−8
4160162.31330 × 10−72.31330 × 10−72.31330 × 10−72.31233 × 10−72.31330 × 10−7
4320321.10458 × 10−61.10740 × 10−61.10740 × 10−61.10012 × 10−61.10740 × 10−6
Table 3. Summarized results (standard deviation of the presented average rectified DC power in Watts of Table 2) for DE, CoDE, L-SHADE, Jaya, and SCP-QCLP WPT modes. The rest of the parameter values (runs, propagation channels, multi-tone waveforms) are equivalent to the values listed in Table 2.
Table 3. Summarized results (standard deviation of the presented average rectified DC power in Watts of Table 2) for DE, CoDE, L-SHADE, Jaya, and SCP-QCLP WPT modes. The rest of the parameter values (runs, propagation channels, multi-tone waveforms) are equivalent to the values listed in Table 2.
Ch. No. T o (ns)NDECODEL-SHADEJayaSCP-QCLP
12022.03845 × 10−233.51964 × 10−211.58721 × 10−232.20533 × 10−231.67116 × 10−24
14041.33885 × 10−111.02679 × 10−108.85871 × 10−237.86836 × 10−231.50404 × 10−23
18084.03736 × 10−111.13520 × 10−171.10534 × 10−221.87888 × 10−163.34231 × 10−24
1160169.54349 × 10−131.99997 × 10−222.01535 × 10−226.63979 × 10−130.00000 × 100
1320326.23144 × 10−107.43970 × 10−226.99875 × 10−223.64317 × 10−115.34770 × 10−23
22021.39288 × 10−215.64683 × 10−235.48058 × 10−236.03609 × 10−236.68463 × 10−24
24041.76173 × 10−217.32920 × 10−124.16063 × 10−226.74128 × 10−171.50404 × 10−23
28082.89007 × 10−141.32441 × 10−221.37417 × 10−221.98612 × 10−151.67116 × 10−23
2160162.46364 × 10−184.15736 × 10−223.40420 × 10−221.86467 × 10−122.00539 × 10−23
2320328.97041 × 10−111.76089 × 10−211.31018 × 10−211.03005 × 10−105.34770 × 10−23
32023.28580 × 10−143.04467 × 10−221.41321 × 10−161.22182 × 10−141.33693 × 10−23
34042.39188 × 10−226.34539 × 10−151.69030 × 10−225.65592 × 10−162.67385 × 10−23
38082.82678 × 10−101.91667 × 10−193.42378 × 10−221.22729 × 10−145.34770 × 10−23
3160162.06269 × 10−121.03325 × 10−211.31526 × 10−211.66107 × 10−112.40647 × 10−22
3320321.45061 × 10−94.96156 × 10−214.22229 × 10−211.00893 × 10−91.06954 × 10−21
42026.71048 × 10−237.98639 × 10−176.73789 × 10−235.96170 × 10−233.34231 × 10−24
44042.68488 × 10−146.84354 × 10−121.48820 × 10−222.21835 × 10−163.34231 × 10−23
48084.20335 × 10−104.79213 × 10−223.62719 × 10−222.50819 × 10−140.00000 × 100
4160162.84362 × 10−151.30842 × 10−211.00846 × 10−212.88276 × 10−111.33693 × 10−22
4320321.88389 × 10−95.03852 × 10−214.83754 × 10−211.54016 × 10−91.06954 × 10−21
Table 4. Best value of the rectified DC power in Watts detected over 50 runs for DE, CoDE, L-SHADE, Jaya, and SCP-QCLP WPT modes. Four different propagation channels were tested and multi-tone waveforms with f c = 910 MHz, B = 100 MHz and T o = 20, 40, 80, 160 or 320 ns. The power constraint was set to P t = 30 dBm.
Table 4. Best value of the rectified DC power in Watts detected over 50 runs for DE, CoDE, L-SHADE, Jaya, and SCP-QCLP WPT modes. Four different propagation channels were tested and multi-tone waveforms with f c = 910 MHz, B = 100 MHz and T o = 20, 40, 80, 160 or 320 ns. The power constraint was set to P t = 30 dBm.
Ch. No. T o (ns)NDECODEL-SHADEJayaSCP-QCLP
12022.07835 × 10−92.07835 × 10−92.07835 × 10−92.07835 × 10−92.07835 × 10−9
14041.12385 × 10−81.12385 × 10−81.12385 × 10−81.12385 × 10−81.12360 × 10−8
18081.29655 × 10−81.29655 × 10−81.29655 × 10−81.29655 × 10−81.29614 × 10−8
1160162.21555 × 10−82.21555 × 10−82.21555 × 10−82.21546 × 10−82.21524 × 10−8
1320326.54631 × 10−86.62450 × 10−86.62450 × 10−86.61330 × 10−86.62428 × 10−8
22021.20617 × 10−81.20617 × 10−81.20617 × 10−81.20617 × 10−81.20617 × 10−8
24041.38367 × 10−81.38367 × 10−81.38367 × 10−81.38367 × 10−81.38289 × 10−8
28081.96685 × 10−81.96685 × 10−81.96685 × 10−81.96685 × 10−81.96655 × 10−8
2160164.20886 × 10−84.20886 × 10−84.20886 × 10−84.20848 × 10−84.20882 × 10−8
2320321.76295 × 10−71.76295 × 10−71.76295 × 10−71.75905 × 10−71.76295 × 10−7
32023.29904 × 10−83.29904 × 10−83.29904 × 10−83.29904 × 10−83.29903 × 10−8
34043.96863 × 10−83.96863 × 10−83.96863 × 10−83.96863 × 10−83.96848 × 10−8
38087.23788 × 10−87.23788 × 10−87.23788 × 10−87.23788 × 10−87.23565 × 10−8
3160162.34189 × 10−72.34189 × 10−72.34189 × 10−72.34148 × 10−72.34189 × 10−7
3320321.21801 × 10−61.21802 × 10−61.21802 × 10−61.21444 × 10−61.21802 × 10−6
42022.11492 × 10−82.11492 × 10−82.11492 × 10−82.11492 × 10−82.11491 × 10−8
44043.03277 × 10−83.03277 × 10−83.03277 × 10−83.03277 × 10−83.03080 × 10−8
48088.18408 × 10−88.18408 × 10−88.18408 × 10−88.18408 × 10−88.18222 × 10−8
4160162.31330 × 10−72.31330 × 10−72.31330 × 10−72.31302 × 10−72.31330 × 10−7
4320321.10730 × 10−61.10740 × 10−61.10740 × 10−61.10277 × 10−61.10740 × 10−6
Table 5. Worst value of the rectified DC power in Watts detected over 50 runs for DE, CoDE, L-SHADE, Jaya, and SCP-QCLP WPT modes. Four different propagation channels were tested and multi-tone waveforms with f c = 910 MHz, B = 100 MHz and T o = 20, 40, 80, 160 or 320 ns. The power constraint was set to P t = 30 dBm.
Table 5. Worst value of the rectified DC power in Watts detected over 50 runs for DE, CoDE, L-SHADE, Jaya, and SCP-QCLP WPT modes. Four different propagation channels were tested and multi-tone waveforms with f c = 910 MHz, B = 100 MHz and T o = 20, 40, 80, 160 or 320 ns. The power constraint was set to P t = 30 dBm.
Ch. No. T o (ns)NDECODEL-SHADEJayaSCP-QCLP
12022.07835 × 10−92.07835 × 10−92.07835 × 10−92.07835 × 10−92.07835 × 10−9
14041.11555 × 10−81.05200 × 10−81.12385 × 10−81.12385 × 10−81.12360 × 10−8
18081.27505 × 10−81.29655 × 10−81.29655 × 10−81.29655 × 10−81.29614 × 10−8
1160162.21499 × 10−82.21555 × 10−82.21555 × 10−82.21518 × 10−82.21524 × 10−8
1320326.32045 × 10−86.62450 × 10−86.62450 × 10−86.58989 × 10−86.62428 × 10−8
22021.20617 × 10−81.20617 × 10−81.20617 × 10−81.20617 × 10−81.20617 × 10−8
24041.38367 × 10−81.37849 × 10−81.38367 × 10−81.38367 × 10−81.38289 × 10−8
28081.96683 × 10−81.96685 × 10−81.96685 × 10−81.96685 × 10−81.96655 × 10−8
2160164.20886 × 10−84.20886 × 10−84.20886 × 10−84.20763 × 10−84.20882 × 10−8
2320321.75929 × 10−71.76295 × 10−71.76295 × 10−71.75450 × 10−71.76295 × 10−7
32023.29902 × 10−83.29904 × 10−83.29904 × 10−83.29903 × 10−83.29903 × 10−8
34043.96863 × 10−83.96862 × 10−83.96863 × 10−83.96863 × 10−83.96848 × 10−8
38087.11523 × 10−87.23788 × 10−87.23788 × 10−87.23787 × 10−87.23565 × 10−8
3160162.34174 × 10−72.34189 × 10−72.34189 × 10−72.34081 × 10−72.34189 × 10−7
3320321.21202 × 10−61.21802 × 10−61.21802 × 10−61.20816 × 10−61.21802 × 10−6
42022.11492 × 10−82.11492 × 10−82.11492 × 10−82.11492 × 10−82.11491 × 10−8
44043.03275 × 10−83.02810 × 10−83.03277 × 10−83.03277 × 10−83.03080 × 10−8
48087.92012 × 10−88.18408 × 10−88.18408 × 10−88.18407 × 10−88.18222 × 10−8
4160162.31330 × 10−72.31330 × 10−72.31330 × 10−72.31164 × 10−72.31330 × 10−7
4320321.09734 × 10−61.10740 × 10−61.10740 × 10−61.09666 × 10−61.10740 × 10−6

Share and Cite

MDPI and ACS Style

Doanis, P.; Boursianis, A.D.; Huillery, J.; Bréard, A.; Duroc, Y.; Goudos, S.K. Differential Evolution in Waveform Design for Wireless Power Transfer. Telecom 2020, 1, 96-113. https://doi.org/10.3390/telecom1020008

AMA Style

Doanis P, Boursianis AD, Huillery J, Bréard A, Duroc Y, Goudos SK. Differential Evolution in Waveform Design for Wireless Power Transfer. Telecom. 2020; 1(2):96-113. https://doi.org/10.3390/telecom1020008

Chicago/Turabian Style

Doanis, Pavlos, Achilles D. Boursianis, Julien Huillery, Arnaud Bréard, Yvan Duroc, and Sotirios K. Goudos. 2020. "Differential Evolution in Waveform Design for Wireless Power Transfer" Telecom 1, no. 2: 96-113. https://doi.org/10.3390/telecom1020008

APA Style

Doanis, P., Boursianis, A. D., Huillery, J., Bréard, A., Duroc, Y., & Goudos, S. K. (2020). Differential Evolution in Waveform Design for Wireless Power Transfer. Telecom, 1(2), 96-113. https://doi.org/10.3390/telecom1020008

Article Metrics

Back to TopTop