Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (192)

Search Parameters:
Keywords = relay-assisted

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
13 pages, 590 KB  
Article
Delay Analysis of Pinching-Antenna-Assisted Cellular Networks
by Muyu Mei and Jiawen Yu
Electronics 2025, 14(22), 4406; https://doi.org/10.3390/electronics14224406 - 12 Nov 2025
Viewed by 239
Abstract
In 5G cellular networks, end-to-end data transmission delay is a key metric for evaluating network performance. High-frequency signal fading and complex transmission links often lead to increased delays. Pinching-antenna optimizes signal propagation through directional transmission, enhancing signal quality and reducing delay. Therefore, this [...] Read more.
In 5G cellular networks, end-to-end data transmission delay is a key metric for evaluating network performance. High-frequency signal fading and complex transmission links often lead to increased delays. Pinching-antenna optimizes signal propagation through directional transmission, enhancing signal quality and reducing delay. Therefore, this paper analyzes the end-to-end transmission delay performance of 5G cellular networks assisted by pinching-antenna. Specifically, the data transmission process is modeled as a two-hop link, where data is first transmitted from the base station to the relay station (RS) via a 5G high-frequency transmission link, and then from the RS to the user equipment via a dielectric waveguide-based pinching-antenna link. We derive the statistical characteristics of the service processes for both the 5G high-frequency transmission link and the dielectric waveguide link. Considering traffic arrivals and service capabilities, we then precisely define the network’s end-to-end delay using stochastic network calculus. Through numerical experiments, we initially evaluate the impact of various network parameters on the performance upper bound and provide system performance. The experimental results show that the pinching-antenna-assisted 5G cellular network significantly reduces end-to-end delay compared with the traditional decode and forward relay, further confirming the substantial advantage of pinching-antenna in optimizing delay performance. Full article
Show Figures

Figure 1

27 pages, 3580 KB  
Article
SWIPT Enabled Wavelet Cooperative NOMA: Energy-Efficient Design Under Imperfect SIC
by Uzma Mushtaq, Asim Ali Khan, Sobia Baig, Muneeb Ahmad and Moisés V. Ribeiro
Electronics 2025, 14(22), 4390; https://doi.org/10.3390/electronics14224390 - 11 Nov 2025
Viewed by 343
Abstract
In new wireless ecosystems, simultaneous wireless information and power transfer (SWIPT) and cooperative non-orthogonal multiple access (CNOMA) together make a potential design model. These systems enhance spectral efficiency (SE), energy efficiency (EE), and data interchange reliability by combining energy harvesting (EH), superposition coding [...] Read more.
In new wireless ecosystems, simultaneous wireless information and power transfer (SWIPT) and cooperative non-orthogonal multiple access (CNOMA) together make a potential design model. These systems enhance spectral efficiency (SE), energy efficiency (EE), and data interchange reliability by combining energy harvesting (EH), superposition coding (SC), and relay-assisted transmission. Despite this, CNOMA’s energy efficiency is still constrained by the fact that relay nodes servicing multiple users require a significant amount of power. Most previous studies look at performance as if imperfect successive interference cancellation (SIC) were possible. To solve these problems, this study presents a multiuser SWIPT-enabled cooperative wavelet NOMA (CWNOMA) framework that reduces imperfect SIC, inter-symbol interference (ISI), and inter-user interference. SWIPT-CWNOMA enhances overall energy efficiency (EE), keeps relays functional, and maintains data transmission strong for users by obtaining energy from received signals. The proposed architecture is evaluated against traditional CNOMA and orthogonal multiple access (OMA) in both perfect and imperfect scenarios with SIC. The authors derive closed-form formulas for EE, signal-to-interference-plus-noise ratio (SINR), and achievable rate to support the analysis. Residual error because of imperfect SIC for near users shows lower values in a varying range of SNR. Across 0–30 dB SNR, SWIPT-CWNOMA achieves, on average, 1.4 times higher energy efficiency, approximately 4.7 lower BER, and 1.9 times higher achievable rate than OFDMA, which establishes SWIPT-CWNOMA as a promising candidate for next-generation energy-efficient wireless networks. Full article
(This article belongs to the Section Microwave and Wireless Communications)
Show Figures

Figure 1

15 pages, 555 KB  
Article
Joint Antenna Selection and Transmit Power Optimization for UAV-Assisted Relaying in Cognitive Radio IoT Networks
by Dong-Woo Lim and Jae-Mo Kang
Mathematics 2025, 13(21), 3540; https://doi.org/10.3390/math13213540 - 4 Nov 2025
Viewed by 229
Abstract
In this paper, we study a cognitive relay Internet of Things (IoT) network aided by an unmanned aerial vehicle (UAV) equipped with multiple antennas. The UAV performs relaying for secondary communication under stringent interference constraints imposed by the primary network. To address the [...] Read more.
In this paper, we study a cognitive relay Internet of Things (IoT) network aided by an unmanned aerial vehicle (UAV) equipped with multiple antennas. The UAV performs relaying for secondary communication under stringent interference constraints imposed by the primary network. To address the outage probability floor problem caused by strong interference channels, we propose a novel joint antenna selection and transmit power optimization scheme for Rician fading channels. By using the time-sharing condition and the Lagrangian dual method, the nonconvex mixed-integer optimization problem is efficiently solved to obtain the optimal solution. Additionally, a closed-form asymptotic lower bound on the outage probability is derived for Rayleigh fading channels, providing valuable performance insights. Numerical results demonstrate that the proposed joint optimization scheme significantly outperforms existing works. Full article
(This article belongs to the Special Issue Computational Methods in Wireless Communication)
Show Figures

Figure 1

30 pages, 1328 KB  
Article
Evaluating the Reliability and Security of an Uplink NOMA Relay System Under Hardware Impairments
by Duy-Hung Ha, The-Anh Ngo, Xuan-Truong Tran, Minh-Linh Dam, Viet-Thanh Le, Agbotiname Lucky Imoize and Chun-Ta Li
Mathematics 2025, 13(21), 3491; https://doi.org/10.3390/math13213491 - 1 Nov 2025
Viewed by 305
Abstract
With the rapid growth of wireless devices, security has become a key research concern in beyond-5G (B5G) and sixth-generation (6G) networks. Non-orthogonal multiple access (NOMA), one of the supporting technologies, is a strong contender to enable massive connectivity, increase spectrum efficiency, and guarantee [...] Read more.
With the rapid growth of wireless devices, security has become a key research concern in beyond-5G (B5G) and sixth-generation (6G) networks. Non-orthogonal multiple access (NOMA), one of the supporting technologies, is a strong contender to enable massive connectivity, increase spectrum efficiency, and guarantee high-quality access for a sizable user base. Furthermore, the scientific community has recently paid close attention to the effects of hardware impairments (HIs). The safe transmission of NOMA in a two-user uplink relay network is examined in this paper, taking into account both hardware limitations and the existence of listening devices. Each time frame in a mobile network environment comprises two phases in which users use a relay (R) to interact with the base station (BS). The research focuses on scenarios where a malicious device attempts to intercept the uplink signals transmitted by users through the R. Using important performance and security metrics, such as connection outage probability (COP), secrecy outage probability (SOP), and intercept probability (IP), system behavior is evaluated. To assess the system’s security and reliability under the proposed framework, closed-form analytical expressions are derived for SOP, IP, and COP. The simulation results provide the following insights: (i) they validate the accuracy of the derived analytical expressions; (ii) the study significantly deepens the understanding of secure NOMA uplink transmission under the influence of HIs across all the network entities, paving the way for future practical implementations; and (iii) the results highlight the superior performance of secure and reliable NOMA uplink systems compared to benchmark orthogonal multiple access (OMA) counterparts when both operate under the same HI conditions. Furthermore, an extended model without a relay is considered for comparison with the proposed relay-assisted scheme. Moreover, the numerical results indicate that the proposed communication model achieves over 90% reliability (with a COP below 0.1) and provides approximately a 30% improvement in SOP compared to conventional OMA-based systems under the same HI conditions. Full article
Show Figures

Figure 1

15 pages, 4162 KB  
Article
Development of a Heating Block as an Aid for the DNA-Based Biosensing of Plant Pathogens
by Bertrand Michael L. Diola, Adrian A. Borja, Paolo Rommel P. Sanchez, Marynold V. Purificacion and Ralph Kristoffer B. Gallegos
Inventions 2025, 10(6), 94; https://doi.org/10.3390/inventions10060094 - 26 Oct 2025
Viewed by 630
Abstract
Deoxyribonucleic acid (DNA)-based biosensors are rapid, cost-effective, and portable devices for monitoring crop pathogens. However, their on-field operations rely on a laboratory-bound heating block, which controls temperature during sample preparation. This study aimed to develop a field-deployable heating block to assist in the [...] Read more.
Deoxyribonucleic acid (DNA)-based biosensors are rapid, cost-effective, and portable devices for monitoring crop pathogens. However, their on-field operations rely on a laboratory-bound heating block, which controls temperature during sample preparation. This study aimed to develop a field-deployable heating block to assist in the DNA hybridization protocol of DNA-based biosensors. It should maintain 95 °C, 55 °C, and 20 °C for 5, 10, and 5 min, respectively. It had aluminum bars, positive thermal coefficient ceramic heaters, a Peltier thermoelectric module, and DS18B20 thermistors, serving twelve 0.2 mL polymerase chain reaction (PCR) tubes. An Arduino microcontroller employing a proportional–integral–derivative (PID) algorithm with a solid-state relay was utilized. Machine performance for distilled water-filled PCR tubes showed a maximum 10 °C thermal variation. The machine maintained (96.00±0.97) °C, (55.15±2.17) °C, and (17.75±0.71) °C with root mean square errors (RMSEs) of 1.40 °C, 2.18 °C, and 2.36 °C, respectively. The average thermal rates were (0.16±0.11) °C/s, (0.29±0.11) °C/s, and (0.14±0.07) °C/s from ambient to 95 °C, 95 °C to 55 °C, and 55 °C to 20 °C, respectively. Overall, the low standard deviations and RMSEs demonstrate thermostable results and robust temperature control. Full article
Show Figures

Figure 1

26 pages, 573 KB  
Article
Mutual V2I Multifactor Authentication Using PUFs in an Unsecure Multi-Hop Wi-Fi Environment
by Mohamed K. Elhadad and Fayez Gebali
Electronics 2025, 14(21), 4167; https://doi.org/10.3390/electronics14214167 - 24 Oct 2025
Viewed by 450
Abstract
Secure authentication in vehicular ad hoc networks (VANETs) remains a fundamental challenge due to their dynamic topology, susceptibility to attacks, and scalability constraints in multi-hop communication. Existing approaches based on elliptic curve cryptography (ECC), blockchain, and fog computing have achieved partial success but [...] Read more.
Secure authentication in vehicular ad hoc networks (VANETs) remains a fundamental challenge due to their dynamic topology, susceptibility to attacks, and scalability constraints in multi-hop communication. Existing approaches based on elliptic curve cryptography (ECC), blockchain, and fog computing have achieved partial success but suffer from latency, resource overhead, and limited adaptability, leaving a gap for lightweight and hardware-rooted trust models. To address this, we propose a multi-hop mutual authentication protocol leveraging Physical Unclonable Functions (PUFs), which provide tamper-evident, device-specific responses for cryptographic key generation. Our design introduces a structured sequence of phases, including pre-deployment, registration, login, authentication, key establishment, and session maintenance, with optional multi-hop extension through relay vehicles. Unlike prior schemes, our protocol integrates fuzzy extractors for error tolerance, employs both inductive and game-based proofs for security guarantees, and maps BAN-logic reasoning to specific attack resistances, ensuring robustness against replay, impersonation, and man-in-the-middle attacks. The protocol achieves mutual trust between vehicles and RSUs while preserving anonymity via temporary identifiers and achieving forward secrecy through non-reused CRPs. Conceptual comparison with state-of-the-art PUF-based and non-PUF schemes highlights the potential for reduced latency, lower communication overhead, and improved scalability via cloud-assisted CRP lifecycle management, while pointing to the need for future empirical validation through simulation and prototyping. This work not only provides a secure and efficient solution for VANET authentication but also advances the field by offering the first integrated taxonomy-driven evaluation of PUF-enabled V2X protocols in multi-hop Wi-Fi environments. Full article
(This article belongs to the Special Issue Privacy and Security Vulnerabilities in 6G and Beyond Networks)
Show Figures

Figure 1

20 pages, 670 KB  
Article
Cooperative Jamming and Relay Selection for Covert Communications Based on Reinforcement Learning
by Jin Qian, Hui Li, Pengcheng Zhu, Aiping Zhou, Shuai Liu and Fengshuan Wang
Sensors 2025, 25(19), 6218; https://doi.org/10.3390/s25196218 - 7 Oct 2025
Viewed by 606
Abstract
To overcome the obstacles of maintaining covert transmissions in wireless networks employing collaborative wardens, we develop a reinforcement learning framework that jointly optimizes cooperative jamming strategies and relay selection mechanisms. The study focuses on a multi-relay-assisted two-hop network, where potential relays dynamically act [...] Read more.
To overcome the obstacles of maintaining covert transmissions in wireless networks employing collaborative wardens, we develop a reinforcement learning framework that jointly optimizes cooperative jamming strategies and relay selection mechanisms. The study focuses on a multi-relay-assisted two-hop network, where potential relays dynamically act as information relays or cooperative jammers to enhance covertness. A reinforcement learning-based relay selection scheme (RLRS) is employed to dynamically select optimal relays for signal forwarding and jamming; the framework simultaneously maximizes covert throughput and guarantees warden detection failure probability, subject to rigorous power budgets. Numerical simulations reveal that the developed reinforcement learning approach outperforms conventional random relay selection (RRS) across multiple performance metrics, achieving (i) higher peak covert transmission rates, (ii) lower outage probabilities, and (iii) superior adaptability to dynamic network parameters including relay density, power allocation variations, and additive white Gaussian noise (AWGN) fluctuations. These findings validate the effectiveness of reinforcement learning in optimizing relay and jammer selection for secure covert communications under colluding warden scenarios. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

25 pages, 2438 KB  
Article
Interior Point-Driven Throughput Maximization for TS-SWIPT Multi-Hop DF Relays: A Log Barrier Approach
by Yang Yu, Xiaoqing Tang and Guihui Xie
Sensors 2025, 25(18), 5901; https://doi.org/10.3390/s25185901 - 21 Sep 2025
Viewed by 397
Abstract
This paper investigates a simultaneous wireless information and power transfer (SWIPT) decode-and-forward (DF) relay network, where a source node transmits data to a destination node through the assistance of multi-hop passive relays. We employ the time-switching (TS) protocol, enabling the relays to harvest [...] Read more.
This paper investigates a simultaneous wireless information and power transfer (SWIPT) decode-and-forward (DF) relay network, where a source node transmits data to a destination node through the assistance of multi-hop passive relays. We employ the time-switching (TS) protocol, enabling the relays to harvest energy from the received previous hop signal to support data forwarding. We first prove that the system throughput monotonically increases with the transmit power of the source node. Next, by employing logarithmic transformations, we convert the non-convex problem of obtaining optimal TS ratios at each relay to maximize the system throughput into a convex optimization problem. Comprehensively taking into account the convergence rate, computational complexity per iteration, and robustness, we selected the log barrier method—a type of interior point method—to address this convex optimization problem, along with providing a detailed implementation procedure. The simulation results validate the optimality of the proposed method and demonstrate its applicability to practical communication systems. For instance, the proposed scheme achieves 1437.3 bps throughput at 40 dBm maximum source power in a 2-relay network—278.6% higher than that of the scheme with TS ratio fixed at 0.75 (379.68 bps). On the other hand, it converges within a 1.36 ms computation time for 5 relays, 6 orders of magnitude faster than exhaustive search (1730 s). Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

19 pages, 6002 KB  
Article
UAV Deployment Design Under Incomplete Information with a Connectivity Constraint for UAV-Assisted Networks
by Takumi Sakamoto, Tomotaka Kimura and Kouji Hirata
Future Internet 2025, 17(9), 401; https://doi.org/10.3390/fi17090401 - 2 Sep 2025
Viewed by 509
Abstract
In this paper, we introduce an Unmanned Aerial Vehicle (UAV) deployment design with a connectivity constraint for UAV-assisted communication networks. In such networks, multiple UAVs are collaboratively deployed in the air to form a network that realizes efficient relay communications from ground mobile [...] Read more.
In this paper, we introduce an Unmanned Aerial Vehicle (UAV) deployment design with a connectivity constraint for UAV-assisted communication networks. In such networks, multiple UAVs are collaboratively deployed in the air to form a network that realizes efficient relay communications from ground mobile clients to the base station. We consider a scenario where ground clients are widely distributed in a target area, with their population significantly outnumbering available UAVs. The goal is to enable UAVs to collect and relay all client data to the base station by continuously moving while preserving end-to-end connectivity with the base station. To achieve this, we propose two dynamic UAV deployment methods: genetic algorithm-based and modified ε-greedy algorithm-based methods. These methods are designed to efficiently collect data from mobile clients while maintaining UAV connectivity, based solely on local information about nearby client positions. Through numerical experiments, we demonstrate that the proposed methods dynamically form UAV-assisted networks to efficiently and rapidly collect client data transmitted to the base station. Full article
Show Figures

Figure 1

24 pages, 5992 KB  
Article
Mathematical Modelling of Throughput in Peer-Assisted Symbiotic 6G with SIC and Relays
by Muhammed Yusuf Onay
Appl. Sci. 2025, 15(17), 9504; https://doi.org/10.3390/app15179504 - 29 Aug 2025
Viewed by 598
Abstract
Sixth-generation (6G) communication systems, with ultra-wide bands, energy-autonomous end nodes, and dense connectivity, challenge existing network designs. Optimizing time resources with energy harvesting, backscatter communication, and relays is essential to maximize the total bit rate in multi-user symbiotic radio networks (SRNs) with blocked [...] Read more.
Sixth-generation (6G) communication systems, with ultra-wide bands, energy-autonomous end nodes, and dense connectivity, challenge existing network designs. Optimizing time resources with energy harvesting, backscatter communication, and relays is essential to maximize the total bit rate in multi-user symbiotic radio networks (SRNs) with blocked direct paths. The literature lacks a unified optimization treatment that explicitly accounts for imperfect successive interference cancellation (SIC). This study addresses this gap by proposing the first optimization framework to maximize total bit rate for energy-harvesting TDMA/PD–NOMA-based multi-cluster and relay-assisted peer-assisted SR networks. The two-phase architecture defines a tractable constrained optimization problem that jointly adjusts cluster-specific time slots (τ and λ). Incorporating QoS, signal power, and reflection coefficient constraints, it provides a compact formulation and numerical solutions for both perfect and imperfect SIC. Detailed simulations performed under typical 6G power levels, bandwidths, and energy-harvesting efficiencies demonstrate graphically that imperfect SIC significantly limits total throughput due to residual interference, while perfect SIC completely eliminates this ceiling under the same conditions, providing a significant capacity advantage. Furthermore, the gap between the two scenarios rapidly closes with increasing relay time margin. The findings demonstrate that network capacity is primarily determined by the triad of base station output power, channel noise, and SIC accuracy, and that the proposed framework achieves strong performance across the explored parameter space. Full article
Show Figures

Figure 1

23 pages, 4594 KB  
Article
Minimization of Resource Consumption with URLLC Constraints for Relay-Assisted IIoT
by Yujie Zhao, Tao Peng, Yichen Guo, Yijing Niu and Wenbo Wang
Sensors 2025, 25(15), 4846; https://doi.org/10.3390/s25154846 - 6 Aug 2025
Viewed by 524
Abstract
In relay-assisted Industrial Internet of Things (IIoT) systems with ultra-reliable low-latency communication (uRLLC) requirements, finite blocklength coding imposes stringent resource constraints. In this work, the packet error probability (PEP) and blocklength allocation across two-hop links are jointly optimized to minimize total blocklength (resource [...] Read more.
In relay-assisted Industrial Internet of Things (IIoT) systems with ultra-reliable low-latency communication (uRLLC) requirements, finite blocklength coding imposes stringent resource constraints. In this work, the packet error probability (PEP) and blocklength allocation across two-hop links are jointly optimized to minimize total blocklength (resource consumption) while satisfying reliability, latency, and throughput requirements. The original multi-variable problem is decomposed into two tractable subproblems. In the first subproblem, for a fixed total blocklength, the achievable rate is maximized. A near-optimal PEP is first derived via theoretical analysis. Subsequently, theoretical analysis proves that blocklength must be optimized to equalize the achievable rates between the two hops to maximize system performance. Consequently, the closed-form solution to optimal blocklength allocation is derived. In the second subproblem, the total blocklength is minimized via a bisection search method. Simulation results show that by adopting near-optimal PEPs, our approach reduces computation time by two orders of magnitude while limiting the achievable rate loss to within 1% compared to the exhaustive search method. At peak rates, the hop with superior channel conditions requires fewer resources. Compared with three baseline algorithms, the proposed algorithm achieves average resource savings of 21.40%, 14.03%, and 17.18%, respectively. Full article
Show Figures

Figure 1

40 pages, 3342 KB  
Article
Enhancing Infotainment Services in Integrated Aerial–Ground Mobility Networks
by Chenn-Jung Huang, Liang-Chun Chen, Yu-Sen Cheng, Ken-Wen Hu and Mei-En Jian
Sensors 2025, 25(13), 3891; https://doi.org/10.3390/s25133891 - 22 Jun 2025
Viewed by 670
Abstract
The growing demand for bandwidth-intensive vehicular applications—particularly ultra-high-definition streaming and immersive panoramic video—is pushing current network infrastructures beyond their limits, especially in urban areas with severe congestion and degraded user experience. To address these challenges, we propose an aerial-assisted vehicular network architecture that [...] Read more.
The growing demand for bandwidth-intensive vehicular applications—particularly ultra-high-definition streaming and immersive panoramic video—is pushing current network infrastructures beyond their limits, especially in urban areas with severe congestion and degraded user experience. To address these challenges, we propose an aerial-assisted vehicular network architecture that integrates 6G base stations, distributed massive MIMO networks, visible light communication (VLC), and a heterogeneous aerial network of high-altitude platforms (HAPs) and drones. At its core is a context-aware dynamic bandwidth allocation algorithm that intelligently routes infotainment data through optimal aerial relays, bridging connectivity gaps in coverage-challenged areas. Simulation results show a 47% increase in average available bandwidth over conventional first-come-first-served schemes. Our system also satisfies the stringent latency and reliability requirements of emergency and live infotainment services, creating a sustainable ecosystem that enhances user experience, service delivery, and network efficiency. This work marks a key step toward enabling high-bandwidth, low-latency smart mobility in next-generation urban networks. Full article
(This article belongs to the Special Issue Sensing and Machine Learning Control: Progress and Applications)
Show Figures

Figure 1

12 pages, 546 KB  
Article
Covert Communications via Full-Duplex User Relaying
by Jong Yeol Ryu and Jung Hoon Lee
Sensors 2025, 25(12), 3614; https://doi.org/10.3390/s25123614 - 9 Jun 2025
Viewed by 794
Abstract
In this paper, we investigate a covert communication system with a full-duplex decode-and-forward (DF) relay and introduce a user-relaying scheme that maximizes the covert rate while ensuring the covertness requirement. In our system model, Alice (transmitter) sends regular data to Carol (regular user) [...] Read more.
In this paper, we investigate a covert communication system with a full-duplex decode-and-forward (DF) relay and introduce a user-relaying scheme that maximizes the covert rate while ensuring the covertness requirement. In our system model, Alice (transmitter) sends regular data to Carol (regular user) and occasionally embeds covert data for Bob (covert user). Meanwhile, Willie (warden) monitors for covert transmissions. Carol assists Alice by acting as a full-duplex DF relay, decoding both data types via successive interference cancellation and relaying covert data using phase steering and power allocation to confuse Willie. Our proposed scheme adopts a novel approach in which the covert data received by Willie is perfectly canceled, optimizing Alice’s and Carol’s transmissions to maximize the covert rate while keeping Willie’s detection probability below a given threshold. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

22 pages, 1423 KB  
Article
On the Performance of Non-Lambertian Relay-Assisted 6G Visible Light Communication Applications
by Jupeng Ding, Chih-Lin I, Jintao Wang and Hui Yang
Photonics 2025, 12(6), 541; https://doi.org/10.3390/photonics12060541 - 26 May 2025
Viewed by 577
Abstract
Visible light communication (VLC) has become one important candidate technology for beyond 5G and even 6G wireless networks, mainly thanks to its abundant unregulated light spectrum resource and the ubiquitous deployment of light-emitting diodes (LED)-based illumination infrastructures. Due to the high directivity of [...] Read more.
Visible light communication (VLC) has become one important candidate technology for beyond 5G and even 6G wireless networks, mainly thanks to its abundant unregulated light spectrum resource and the ubiquitous deployment of light-emitting diodes (LED)-based illumination infrastructures. Due to the high directivity of VLC channel propagation, relay-based cooperative techniques have been introduced and explored to enhance the transmission performance of VLC links. Nevertheless, almost all current works are limited to scenarios adopting well-known Lambertian transmitter and relay, which fail to characterize the scenarios with distinctive non-Lambertian transmitter or relay. For filling this gap, in this article, relay-assisted VLC employing diverse non-Lambertian optical beam configurations is proposed. Unlike the conventional Lambertian transmitter and relay-based research paradigm, the presented scheme employs the commercially available non-Lambertian transmitter and relay to configure the cooperative VLC links. Numerical results illustrate that up to 40.63 dB SNR could be provided by the proposed non-Lambertian relay-assisted VLC scheme, compared with about a 34.22 dB signal-to-noise ratio (SNR) of the benchmark Lambertian configuration. Full article
Show Figures

Figure 1

24 pages, 1026 KB  
Article
Service Cache-Based Offloading and Resource Optimization Algorithm for UAV-Assisted Computing
by Zihao Li and Qi Zhu
Electronics 2025, 14(8), 1578; https://doi.org/10.3390/electronics14081578 - 13 Apr 2025
Viewed by 629
Abstract
Edge computing minimizes data transmission delay and fulfills the requirements of real-time applications for the wireless network coverage problem in edge computing. This paper proposes a resource optimization algorithm based on service caching, and designs a hybrid computing model of UAV-assisted computation offloading [...] Read more.
Edge computing minimizes data transmission delay and fulfills the requirements of real-time applications for the wireless network coverage problem in edge computing. This paper proposes a resource optimization algorithm based on service caching, and designs a hybrid computing model of UAV-assisted computation offloading and service programs, in which the UAV (Unmanned Aerial Vehicle) not only carries a server for computation offloading but also serves as a relay to assist in the downloading of service programs. The objective is to minimize the system’s total energy consumption while adhering to constraints such as delay, cache capacity, and other relevant factors. Because of the non-convex nature of the objective problem, it is divided into three sub-problems for more effective handling. Through analysis, the relationship between the resource allocation ratio and total system energy consumption is established, and the simulated annealing algorithm, greedy algorithm, and genetic algorithm are used to solve these sub-problems, respectively. Finally, the global optimal solutions for location deployment, service caching, resource allocation, and offloading decisions are obtained through iteration. The simulation results show that the proposed algorithm successfully reduces the total energy consumption of the system while maintaining task completion delay constraints. Full article
Show Figures

Figure 1

Back to TopTop