Вы находитесь на странице: 1из 6

Self-energized Bidirectional Sensor Networks over

Hoyt Fading Channels under Hardware Impairments


Stefan Panic∗ , Dushantha Nalin K. Jayakody∗ , and Sahil Garg†
∗ School of Computer Science and Robotics, National Research Tomsk Polytechnic University,Tomsk, Russia RUSSIA
† Electrical
Engineering Department, École de technologie supérieure, Montréal, QC H3C 1K3, Canada
Email: {stefanpnc, nalin}@tpu.ru, and garg.sahil1990@gmail.com

Abstract—With the rapid emergence of the Internet of Things is obtaining radio frequency (RF) energy from the ambient
(IoT) paradigm, the evolution of wireless senor networks (WSNs) transmitter sources. Based on the principle that RF signals can
is expected to witness a major blow. However, the accelerated carry both energy and information at the same time, simulta-
upsurge of sensors in the future IoT networks will face significant
challenges due to their limited battery life capacity. Thus, it is neous wireless information and power transfer (SWIPT) is an
essential to devise efficient schemes to prolong the battery life interesting new area of research for WSNs that has attracted
of the connected sensors in order to derive their full potential increasing attention by both academia and industry [1], [6].
in the future interconnected IoT networks. Towards this end, Some of the notable contributions made by the research
different energy harvesting (EH) techniques relying on wide fraternity in this direction are illustrated as follows. In [7],
array of sources namely solar, wind, thermal, coupled magnetic
resonances and radio frequency have been proposed in the SWIPT receiver architecture designs based on time switching
literature. Working in the similar direction, in this work, an (TS) and power splitting (PS) have been proposed; while
EH system based on time-switching has been proposed for the performance analysis of these two EH protocols was
half-duplex bidirectional WSN with intermediate relay over a carried out in [8]. Modeling of hardware impairment in system
Hoyt fading channel. For its extensive performance analysis, performance analysis has been observed often in the literature
exact closed-form expressions have been derived with respect
to outage probability (OP) and achievable throughput of the [9], [10], [11]. In [12], performance analysis of time-switching
system under the hardware impairment condition. Additionally, EH strategy that was applied for a half-duplex bidirectional
asymptotic analysis of high signal-to-noise-ratio (SNR) regime WSN with intermediate relay over a Rician fading channel
for these performance measures has also been provided. Further, was derived. Performance analysis of EH based decode-and-
an approach for the symbol-error-rate (SER) analysis is also forward relaying in the presence of transceiver imperfections,
presented in context of the observed system. In a nutshell,
the work provides a detailed analysis of the effects of various within Rayleigh fading environment was provided in [13].
parameters on the performances of energy harvesting applied in Problem of characterization of the random nature of most
wireless sensor networks over a Hoyt fading channel. of the small-scale fading models for WSN communications,
Index Terms—Hardware impairment, Half-duplex, Hoyt fad- can be reduced to the problem of characterization of complex
ing channels, Relay networks, Time-switching, and Wireless Gaussian random process. Hoyt propagation model is used
energy harvesting.
for modeling short- term signal variations arising from the
I. INTRODUCTION addition of scattered waves. This physical random process
can be described as a complex Gaussian RV where both
The future Internet of Things (IoT) tends to connect trillions
in-phase and in-quadrature components have zero mean and
of devices, and thus wireless sensors are expected to play a
different variances [14]. However, this model also serves as
crucial role in such interconnected networks. Due to the large
a good representation for the scenario when the in-phase and
scale implementation of such networks, battery replacement
quadrature components are correlated [15]. Also it is well-
will become a crucial issue for the massive number of wire-
known that this model could be used for modeling propagation
less sensors. To efficiently address underlying sensor’s finite
conditions more severe than Rayleigh, and that can be reduced
lifetime problem in IoT, different techniques such as wire-
to a special case of Rayleigh model by setting corresponding
less power transfer-powered and energy harvesting-powered
values of model parameters.
wireless sensor networks (WSNs) have emerged as promising
Since Rayleigh model is the widely most used for the
solutions [1]. Since WSNs are subjected to limited energy
transmission particularly when there is no direct line-of-sight
storage at each mobile node, reduction of energy consumption
(LOS) between the transmitter and the receiver, studying
(extension of sensor node battery life) has evolved as a
wireless performance measures based on Hoyt model provides
mainstream research issue in WSNs.
significant generalization of all previous considered scenarios.
Towards this direction, various energy harvesting (EH)
In [16], authors presented how performance metrics for Hoyt
sources have been studied in the literature such as solar
fading can be approximated by leveraging well-known results
[2], wind [3], thermal [4], coupled magnetic resonances [5],
for Rayleigh fading.
etc. However, the most sought after technique in this regard
A. Contributions
Key contributions of this work are summarized as follows:
• Rapidly converging closed-form expressions are derived
for the outage probability (OP) and achievable through-
put at each destination node with imperfect hardware in
Hoyt fading environment.
• We derive the closed-form expressions for the cumu-
lative distribution function (CDF) of the SNR at each
destination node. This result can be used in order to
derive the integral form of the symbol-error rate (SER)
at destination nodes. Fig. 1: The proposed system model.
• We also provide the asymptotic analysis and the approx-
imation of above mentioned performance criteria at high
SNR regime. time slot (time length of αT ) relay harvests energy from the
• The obtained results are analytically verified through nodes S1 and S2 , while the other two remaining time slots
extensive Monte Carlo simulations. (each slot has same time length of (1 - α)T/2) are used for
information transferring. During the second time slot, S1 and
B. Organization S2 simultaneously transmit to R while, during the third time
The rest of paper is organized as follows: Section II slot, R amplifies the signal received during the second time
describes the system model and the employed EH protocol. slot and broadcasts it to S1 and S2 . Let us denote the average
Section III and IV provide the detailed performance analysis power transmitted by each node S1 and S2 during the first
of the system, including exact analysis and asymptotic anal- time slot by P , then the amount of the harvested energy at
ysis. Further, the obtained numerical results are illustrated in node R after time αT can be expressed as [12]:
Section V, while conclusions are drawn in Section VI.
Er = (P |g1 |2 + P |g2 |2 )ηαT. (1)
II. SYSTEM MODEL
Let s1 and s2 denote the information-bearing symbols trans-
A. System Model Description mitted from S1 and S2 , respectively, and having the same
Let us consider a bidirectional network consisting of two average power P , i.e., E(|si |2 ) = P . The received signal at
sources and one relay as illustrated in Figure 1. It has been R during the second time slot is denoted using the following
assumed that each source transmit its data to the relay node in equation.
different time slots to avoid interference from other sources. 2
Nevertheless, when analog coding is used, data could be
X
yr = gi (si + ηi ) + nr , i = 1, 2, (2)
transmitted simultaneously to the relay node, which then i=1
further forwards this noisy sum of two signals to the next
where ηi denotes the hardware distortion noise at Si with zero
time slot. Since each node already knows one of the signals,
mean and variance κ2 P , while nr denotes the additive white
it can cancel its own part in the received signals and decode
Gaussian noise (AWGN) at R with zero mean and variance
the message sent by the other source. It is also assumed that
σr2 . Additionally, the parameter κ is used for characterization
every terminal is with only one antenna and operates in half-
of the level of impairments of the channel.
duplex mode.
Let S1 , S2 and R denote the first node, the second node During the second time slot, before re-transmission, R
and the relay node, respectively. We denote the channel gain amplifies the signal yr with an amplifying coefficient β. Thus,
between node Si and the relay R as gi , for i = 1, 2. Here, the received signal yi at node Si at the third time slot can be
both channels are assumed to be exposed to the influence of computed using the following equation.
Hoyt fading. Hardware impairment will be observed at both yi = gi (βyr + ηr ) + ni , i = 1, 2, (3)
source nodes (S1 and S2 ) and relay node R. Since direct
link between two nodes is not reliable for communication, In the above equation, ηr denotes the distortion noise with
the communication between sources is assumed to undergo zero mean and variance κ2r Pr , while ni denotes the AWGN
through relay. Since, the relay obtains only the energy to at Si with zero mean and variance σi2 , for i = 1, 2.
serve its own purpose, it needs to harvest the energy from Here, the law of energy conservation must be obeyed, so
the source nodes before it forwards the information messages. the total energy that R can use to transmit must be equal to
Additionally, it is also assumed that sources and the relay are the total energy that R receives during the first time slot, Er .
aware of the channel gains. The average power of the signal transmitted by R during the
third time slot can be expressed as in [12]:
B. Energy Harvesting and Information Transfer Protocols
Er
= ψ P |g1 |2 + P |g2 |2 ,

The EH protocol employed for the considered system is Pr = (4)
(1 − α)T /2
presented at Figure 1. The transmission is divided into blocks
2ηα
of length T which consist of three time slots. During the first where coefficient ψ is expressed as: ψ = 1−α . In order to
ensure that the transmission power at R is Pr , the amplifying where γth = 22R - 1, and R denotes source transmission rate.
coefficient β can be chosen as in [12]:
s
Pr Theorem 1. (Outage probability-closed form expression).
β= , (5) The exact OP for node S1 of the proposed half-duplex
X1 P + X1 P κ + X2 P + X2 P κ2 + σr2
2
bidirectional WSN using time-switching EH strategy over a
where Xi = |gi |2 and denotes the square of channel gain Hoyt fading channel can be expressed as:
amplitude between Si and R. In this case, relay node R does
not need to estimate the hardware noise parameters as well
∞ 2k+1 ∞ X m X r   
as the individual channel gains gi , it only depends on symbol X XX m r γ˜th m am−r bp
power received during the 2nd time slot as evident from Eq. Pout1 = 1 −
r p k!l!m!Γ(k + 1)
k=0 m=0 l=0 r=0 p=0
(5). Because of the symmetry of nodes S1 and S2 , we can
(1+q 2 )2 bγ˜
 
observe only one node, and received signal y1 can be rewritten cr−p (1 − q24 )2k (1 − q14 )2l (1 + q12 ) exp − 4q22 Ω2 th
2
as:
Γ(l + 1)22k+2m+6l−3 (1 + q22 )4k−2m+3 q22m−3 q14l+1 Ω2l+2
1
γ1 = β|g1 |2 s1 + β|g1 |2 η1 + β|g1 ||g2 |s2 (6)   2l−2r+p+m+2
ζ1 2 p
+β|g1 ||g2 |η2 + β|g1 |nr + |g1 |nr + n1 . K(2l−2r+p+m+2) (2 ζ1 ζ2 ),
ζ2
This signal contains both messages s1 and s2 , but node S1 (12)
knows its own transmitted symbol s1 , so it can remove the (1+q22 )2 cγ˜
th (1+q22 )2 aγ˜
th (1+q12 )2
corresponding self-interference factor β|g1 |2 s1 from y1 . Now, where ζ1 = 4q22 Ω2
, ζ2 = 4q22 Ω2
+ 4q12 Ω1
.
SNR value for detection of the symbol s1 at S1 can be
expressed as in [12]: Proof of Theorem 1: See Appendix 1.
Remark 1. OP at node S2 can also be obtained by
β 2 |g1 |2 |g2 |2 P
γ1 = β 2 |g1 |4 P κ2 +β 2 |g1 |2 |g2 |2 P κ2 +β 2 |g1 |σr2 +|g1 |2 Pr κ2r +σ12
. (7) exchanging indices in Eq. (12).
σ2 σ2 B. Achievable Throughput
Using the fact that P1 r r ≈ 0, assuming that σ12 = σ22 = σr2 =
N0 , and taking into account Eq. (6), we obtain, as in [12]: Having the OP obtained from Theorem 1, the achievable
throughput of the observed system can be computed using the
X1 X2
γ1 = , (8) below mentioned equation
X1 X2 a + X12 a + X1 b + c
R
1+κ2r 1+κ2 τi = (1 − Pouti ) (1 − α), i = 1, 2. (13)
where a = κ2 + κ2r (1 + κ2 ), b = P/σr2 , c= ψP/σr2 . 2
C. SER Analysis
III. SYSTEM PERFORMANCES Let Fγi (x) be the CDF of γi , then SER at node Si can be
expressed as:
A. Outage probability √ Z √
ω θ ∞ exp(− θx)
Since the random variable (RV) Xi is Hoyt distributed for SERi = √ √ Fγi (x)dx, (14)
2 π 0 x
i = 1, 2, the probability density function (PDF) of Xi can be
found as [15]: where ω and θ are parameters that specify modulation format,
2
!  i.e., ω = 1, θ = 1 for Binary Phase Shift Keying (BPSK) and ω
1 + qi2 (1 − qi2 ) Xi (1 − qi4 )Xi

fXi (Xi ) = exp − I0 , = 1, θ = 2 for Quadrature Phase Shift Keying (QPSK). Based
2qi Ω̄i 4qi2 Ω̄i 4qi2 Ω̄i on previous equation, SER analysis for observed case can be
(9) carried out.
where Ωi denotes the channel average SNR value, I0 (x) is the
D. Optimal Time-Switching Factor
zero-th order modified Bessel function of the first kind [17],
and 0 ≤ qi ≤ 1 is the desired signal Hoyt fading parameter. Trade-off between the amount of time allocated for EH and
The cumulative density function (CDF) of the RV Xi (i = the duration of the transmission in the considered protocol,
1, 2) can be derived as: must be performed in a way that, as higher as possible avail-

(1+q 2 )2 X
 able transmission power should be obtained, while keeping
(1−qi4 )2k qi3−2m Xim exp − 4qi Ω i
P∞ P2k+1 i i at the same time the transmission rate as high as possible.
FXi (Xi ) = 1 − k=0 m=0 Γ(k+1)k!1+qi2 )4k−2m+3 m!22k+2m−3 Ωm .
i In other words, the task is to determine an optimal time-
(10)
switching factor α∗ that provides the best throughput per-
OP of this system is defined as the probability that the end-
formance. An efficient approach for performing such a task
to-end SNR falls below a desired threshold, γth , and can be
would be solving dτdα i (α)
= 0. However, Eq. (13) is written
expressed as:
in the form of infinite series and modified Bessel function of
Pout1 = Fγ1 (γth ) = Pr (γ1 < γth ) = (11) second kind, and it is hard to provide a closed-form solution
for this case. Alternative approach is applying an iterative
 
X1 X2
= Pr < γth , algorithm for obtaining this solution numerically. In literature
X1 X2 + aX12 + bX1 + c
Golden section search algorithm [18]- [19] has been exten- TABLE I: Observed values of system parameters
sively used for optimal time switching factor determination
[12]. Symbol Parameter Names Values
λ Energy harvesting efficiency 0.7
IV. A SYMPTOTIC A NALYSIS
Ω1 Mean of g12 0.5
In order to provide full insights into the impact of hardware Ω2 Mean of g22 0.5
impairments on the network performance and to verify the q1 = q2 fading severity parameter 0.5,0.8
correctness of the exact analysis, asymptotic analysis for the P/N0 Source-power-to-noise ratio 0-50 dB
high SNR regime should be carried out. κ = κr Hardware impairment levels 0, 0.1, 0.2
A. Outage probability R Source transmission rate 1.5 bps/Hz
As the P/N0 obtains very high values, the SNR in Eq. (8)
is asymptotically equal to:
X2
γ1∞ =
1,0
, (15)
a(X1 + X2 ) 0,9

and, similarly: 0,8

X1
γ2∞ = . (16) 0,7

a(X1 + X2 )

Outage probability
0,6

Theorem 2. (Outage probability-Asymptotic form).


0,5
The asymptotic OP for node S1 of the proposed half-duplex
bidirectional WSN using time-switching EH strategy over a 0,4
Analysis perfect hardware q
1
= q
2
= 0.5

Hoyt fading channel can be provided as: 0,3


Asymptotic perfect hardware q

Analysis 0.1 q
1
= q
2
= 0.5
1
= q
2
= 0.5

Asymptotic 0.1 q = q = 0.5


1 2

0,2 Analysis 0.2 q = q = 0.5


1 2

Asymptotic 0.2 q = q = 0.5


1 2

X∞ X ∞ 2k+1
X (1 − q 4 )2k (1 − q 4 )2l (1 − q1 )2 0,1 Analysis perfect hardware q
1
= q
2
= 0.8

2 1
=1−
Asymptotic perfect hardware q = q = 0.8

Pout1 1 2

k=0 l=0 m=0


k!l!m!Γ(k + 1)Γ(l + 1)q22m−3 0,0
0 5 10 15 20 25 30 35 40 45

 m
aγth −(m+2l+2) P/N
0
[dB]

Γ(m + 2l + 2) 1−aγ th
ξ2
.
(1 + q22 )4k−2m+3 22k+2m+6l−3 x¯2 m x¯1 2l+2 q14l+1
Fig. 2: Outage probability versus P/N0 .
(17)

Proof of Theorem 2: See Appendix 2. From Figs. 2 and 3 it is clearly visible that OP values
Remark 2. The outage probability at node S1 can also be decreases, while throughput values increases as κ varies from
obtained by exchanging indices in Eq. (17). 0 to 0.2. Additionally, it is also visible that for high SNR
values, the OP and throughput values tend to approach the
V. NUMERICAL RESULTS corresponding asymptotic values obtained from analysis, in a
In order to validate the correctness of the derived rapidly manner that lower the value of κ, the faster asymptotic values
converging closed-form OP expressions, Monte Carlo sim- will be reached. Figures also depict how change in fading
ulations have been carried out. The hardware impairment severity over the links (q parameter values change from 0.8
parameters are chosen as κ = κr = 0.1, while a case of to 0.5) significantly deteriorates system performances.
ideal hardware impairment (κ = κr = 0) is also observed. The The effect of hardware impairment level on the OP and
channel gains are considered as Hoyt fading with Ω1 = Ω2 = the achievable throughput is observed more closely in Figs. 4
0.5 and with the Hoyt q fading severity parameters spanning and 5, for single SNR value of 20 dB and fixed transmission
from 0.5 to 0.8 for both channels. All the other observed rate value. Three scenarios have been observed, i.e., i) when
parameters values for the energy harvesting efficiency, source the EH duration is dominant, ii) when there is a balance
transmission rate and source-power-to-noise ratio are provided between EH and information transmission, and iii) when the
in Table I. information transmission duration is dominant (α = 0.2, 0.5,
Figs. 2 and 3 show the effect of SNR on the OP and 0.8).
throughput of the proposed system, respectively. For simu- Again, it is validated that values obtained by using derived
lation, a case of α = 0.5 has been considered, when the closed-form expressions excellently match with the corre-
EH time and the duration of transmission are balanced. It sponding values obtained by Monte Carlo simulations. From
can be seen from the figures that OP and throughput values Figs. 4 and 5, it is evident that the achievable throughput
obtained by using derived closed-form expressions excellently values decrease while the OP values increase significantly
match with the corresponding values obtained by Monte Carlo with the increase of the impairment level κ. Also OP tends to
simulations. reduce at higher time-switching factor, since higher amount
0,4 0,5

Analysis perfect hardware q = q = 0.8


1 2
Analysis with = 0.2 q = q = 0.5
1 2
Asymptotic perfect hardware q = q = 0.8
1 2

Analysis perfect hardware q = q = 0.5 Analysis with = 0.5 q = q = 0.5


1 2 1 2

Asymptotic perfect hardware q = q = 0.5 0,4


1 2
Analysis with = 0.8 q = q = 0.5
1 2
Analysis 0.1 q = q = 0.5
0,3 1 2

Analysis with = 0.2 q = q = 0.8


Asymptotic 0.1 q = q = 0.5 1 2
1 2

(Bit/s/Hz)
(Bit/s/Hz)

Analysis 0.2 q = q = 0.5


1 2

Asymptotic 0.2 q = q = 0.5


1 2 0,3

Throughput
Throughput

0,2

0,2

0,1
0,1

0,0
0,0
0,00 0,05 0,10 0,15 0,20 0,25
0 5 10 15 20 25 30 35 40 45

P/N [dB] r
0

Fig. 3: Achievable throughput versus P/N0 . Fig. 5: Achievable throughput versus κ.

lays the foundation for efficient SER evaluation and optimal


1,0
time-switching factor determination. Above all, the effects
of various parameters on the system performance have been
discussed in detail in the proposed work.
0,8
Outage probability

0,6
APPENDIX 1

Analysis with = 0.2 q = q = 0.5


1 2 Let us here provide proof of Theorem 1. Without loss of
0,4 Analysis with = 0.5 q = q = 0.5
1 2
generality, we can consider the node S1 only. From Eq. (14),
Analysis with = 0.8 q = q = 0.5

Analysis with = 0.2 q = q = 0.8


1 2

we can fix X1 at some value x1 and compute the probability


1 2

using Eq. (11) in terms of x1 . Then, we take the average of


0,2
0,00 0,05 0,10 0,15 0,20 0,25 the obtained function with respect to the distribution of X1
r to obtain OP. Using this approach, Eq. (11) can be rewritten
as:
Z ∞
γth x21 a + γth x1 b + γth c
 
Fig. 4: Outage probability versus κ. FX2 fx1 (x1 )dx. (18)
0 x1 − γth x1 a
γth γ x2 a+γ x b+γ c
of power is used for data transmission. However, influence Let us denote γ˜th = 1−aγ , then th 1x1 −γthth x11 a th
 th
of parameter α values change on the achievable throughput reduces to γ˜th x1 a + xc1 + b . By applying the binomial
values is more complex, since it can be seen from Fig. 5, that formula (x + y)m =
Pm m
 m−n n
x y , using Eq.
n=0 n
the throughput performance is improved when α increases (1+q22 )2 cγ˜th
from 0.2 to 0.5, while they deteriorate when α increases from (3.471.9) from [17], and introducing ζ1 = 4q 2 Ω2
,
2
(1+q22 )2 aγ˜ (1+q12 )2
0.5 to 0.8. Significant influence of fading severity change is ζ2 = 4q22 Ω2
th
+ 4q12 Ω1
, we obtain:
visible from the figures.
∞ 2k+1 ∞ X m X r   
VI. CONCLUSIONS X XX m r γ˜th m am−r bp
Pout1 = 1 −
In this work, a detailed performance analysis of a half- r p k!l!m!Γ(k + 1)
k=0 m=0 l=0 r=0 p=0
duplex bidirectional sensor network has been carried out; (1+q 2 )2 bγ˜
 
cr−p (1 − q24 )2k (1 − q14 )2l (1 + q12 ) exp − 4q22 Ω2 th
wherein the relay node is equipped with time-switching 2

based EH protocol over Hoyt fading channels. In addition to Γ(l + 1)22k+2m+6l−3 (1 + q22 )4k−2m+3 q22m−3 q14l+1 Ω2l+2
1
consideration a general Hoyt propagation scenario, the work   2l−2r+p+m+2
ζ1 2 p
takes in account hardware impairments at source and relay × K(2l−2r+p+m+2) (2 ζ1 ζ2 ),
nodes. Further, exact and asymptotic closed form expressions ζ2
for the OP and achievable throughput have been derived where Kv (x) is the th-order modied Bessel function of the
and verified using Monte Carlo simulations. The proposed second kind.
APPENDIX 2 [16] J. M. Romero-Jerez and F. J. Lopez-Martinez, “A new framework
for the performance analysis of wireless communications under hoyt
The asymptotic OP at node S1 can be expressed as: (Nakagami-q) Fading,” IEEE Transactions on Information Theory,
  vol. 63, no. 3, pp. 1693–1702, 2017.
∞ ∞ X1 [17] D. Zwillinger, V. Moll, I. S. Gradshteyn, and I. M. Ryzhik, Table of
Pout = P r(γ 1 < γth ) = P r < aγth =
1
X1 + X2 integrals, series, and products, 8th ed. Boston, MA, USA: Academic
Z ∞   press, 2015.
aγth x1 [18] T. Q. Duong, T. T. Duy, M. Matthaiou, T. Tsiftsis, and G. K. Karagian-
FX2 fX1 (x1 )dx1 . (19)
0 1 − aγth nidis, “Cognitive cooperative networks in dual-hop asymmetric fading
channels,” in IEEE Global Communications Conference (GLOBECOM).
Now by using (3.381.4) from [17], we obtain the asymptotic IEEE, 2013, pp. 955–961.
formula: [19] E. K. Chong and S. H. Zak, An introduction to optimization, 3rd ed.
Hoboken, NJ, USA: John Wiley & Sons, 2013, vol. 76.
X∞ X ∞ 2k+1
X (1 − q 4 )2k (1 − q 4 )2l (1 − q1 )2
2 1
Pout1 = 1 −
k=0 l=0 m=0
k!l!m!Γ(k + 1)Γ(l + 1)q22m−3
 m
aγth −(m+2l+2)
Γ(m + 2l + 2) 1−aγ th
ξ2
× ,
(1 + q22 )4k−2m+3 22k+2m+6l−3 x¯2 m x¯1 2l+2 q14l+1
where Γ(x) denotes the gamma function. The asymptotic
throughput can be obtained by substituting expression into
the formula for the throughput.
R EFERENCES
[1] D. N. K. Jayakody, J. Thompson, S. Chatzinotas, and S. Durrani,
Wireless Information and Power Transfer: A New Paradigm for Green
Communications. Springer, Jul. 2017.
[2] C. Wang, J. Li, Y. Yang, and F. Ye, “Combining solar energy harvesting
with wireless charging for hybrid wireless sensor networks,” IEEE
Transactions on Mobile Computing, no. 1, pp. 1–1, 2018.
[3] S. Kosunalp, “An energy prediction algorithm for wind-powered wire-
less sensor networks with energy harvesting,” Energy, vol. 139, pp.
1275–1280, 2017.
[4] A. Prijić, L. Vračar, D. Vučković, D. Milić, and Z. Prijić, “Thermal
energy harvesting wireless sensor node in aluminum core PCB technol-
ogy,” IEEE Sensors Journal, vol. 15, no. 1, pp. 337–345, 2015.
[5] S. Guo, C. Wang, and Y. Yang, “Joint mobile data gathering and
energy provisioning in wireless rechargeable sensor networks,” IEEE
Transactions on Mobile Computing, vol. 13, no. 12, pp. 2836–2852,
2014.
[6] L. R. Varshney, “Transporting information and energy simultaneously,”
in IEEE International Symposium on Information Theory, Toronto, ON,
Canada. IEEE, 2008, pp. 1612–1616.
[7] X. Zhou, R. Zhang, and C. K. Ho, “Wireless information and power
transfer: Architecture design and rate-energy tradeoff,” IEEE Transac-
tions on communications, vol. 61, no. 11, pp. 4754–4767, 2013.
[8] A. A. Nasir, X. Zhou, S. Durrani, and R. A. Kennedy, “Relaying
protocols for wireless energy harvesting and information processing,”
IEEE Transactions on Wireless Communications, vol. 12, no. 7, pp.
3622–3636, 2013.
[9] E. Bjornson, M. Matthaiou, and M. Debbah, “A New Look at Dual-
Hop Relaying: Performance Limits with Hardware Impairments,” IEEE
Transactions on Communications, vol. 61, no. 11, pp. 4512–4525, Nov.
2013.
[10] T. N. Nguyen, T. T. Duy, G.-T. Luu, P. T. Tran, and M. Vozňák, “Energy
harvesting-based spectrum access with incremental cooperation, relay
selection and hardware noises,” vol. 10, p. 240250, 2017.
[11] C. Peng, F. Li, and H. Liu, “Wireless energy harvesting two-way relay
networks with hardware impairments,” Sensors, vol. 17, no. 11, p. 2604,
2017.
[12] T. Nguyen, T. Quang Minh, P. Tran, and M. Vozňák, “Energy harvesting
over Rician fading channel: A performance analysis for half-duplex
bidirectional sensor networks under hardware impairments,” Sensors,
vol. 18, no. 6, p. 1781, 2018.
[13] D. K. Nguyen, D. N. K. Jayakody, S. Chatzinotas, J. S. Thompson,
and J. Li, “Wireless energy harvesting assisted two-way cognitive relay
networks: Protocol design and performance analysis,” IEEE Access,
vol. 5, pp. 21 447–21 460, 2017.
[14] M. Simon and M. Alouini, “Digital communication over fading chan-
nels,” 2001.
[15] S. Panic, M. Stefanovic, J. Anastasov, and P. Spalevic, Fading and
interference mitigation in wireless communications. CRC Press, 2013.

Вам также может понравиться