Recent emphasis on green communications has generated great interest in the investigations of energy harvesting communications and networking. Energy harvesting from ambient energy sources can ...potentially reduce the dependence on the supply of grid or battery energy, providing many attractive benefits to the environment and deployment. However, unlike the conventional stable energy, the intermittent and random nature of the renewable energy makes it challenging in the realization of energy harvesting transmission schemes. Extensive research studies have been carried out in recent years to address this inherent challenge from several aspects: energy sources and models, energy harvesting and usage protocols, energy scheduling and optimization, implementation of energy harvesting in cooperative, cognitive radio, multiuser and cellular networks, etc. However, there has not been a comprehensive survey to lay out the complete picture of recent advances and future directions. To fill such a gap, in this paper, we present an overview of the past and recent developments in these areas and highlight a number of possible future research avenues.
This paper explores the rate-energy (R-E) region of simultaneous wireless information and power transfer for MIMO broadcasting channel under the nonlinear radio frequency energy harvesting (EH) ...model. The goal is to characterize the tradeoff between the maximal energy transfer versus information rate. The separated EH and information decoding (ID) receivers and the co-located EH and ID receivers scenarios are considered. For the co-located receivers scenario, both time switching (TS) and power splitting (PS) receiver architectures are investigated. Optimization problems are formulated to derive the boundaries of the R-E region s for the considered systems. As the problems are nonconvex, we first transform them into equivalent ones and derive some semi-closed-form solutions, and then design efficient algorithms to solve them. Numerical results are provided to show the R-E region s of the systems, which provide some interesting insights. It is shown that all practical circuit specifications greatly affect the system R-E region. Compared with the systems under traditional linear EH model, the ones under the nonlinear EH model achieve smaller R-E region s due to the limitations of practical circuit features and also show very different R-E tradeoff behaviors.
In this paper, online convex optimization problem with time-varying constraints is studied from the perspective of an agent taking sequential actions. Both the objective function and the constraint ...functions are dynamic and unknown a priori to the agent. We first consider the scenario of the gradient feedback, in which, the values and gradients of the objective function and constraint functions at the chosen action are revealed after an action is submitted. We propose a computationally efficient online algorithm, which only involves direct closed-form computations at each time instant. It is shown that the algorithm possesses sublinear regret with respect to the dynamic benchmark sequence and sublinear constraint violations, as long as the drift of the benchmark sequence is sublinear, or in other words, the underlying dynamic optimization problems do not vary too drastically. Furthermore, we investigate the scenario of the bandit feedback, in which, after an action is chosen, only the values of the objective function and the constraint functions at several random points close to the action are announced to the agent. A bandit version of the online algorithm is proposed and we also establish its sublinear expected regret and sublinear expected constraint violations under the assumption that the drift of the benchmark sequence is sublinear. Finally, two numerical examples, namely online quadratic programming and online logistic regression, are presented to corroborate the effectiveness of the proposed algorithms and to confirm the theoretical guarantees.
Many forensic techniques have recently been developed to determine whether an image has undergone a specific manipulation operation. When multiple consecutive operations are applied to images, ...forensic analysts not only need to identify the existence of each manipulation operation, but also to distinguish the order of the involved operations. However, image operator chain detection is still a challenging problem. In this paper, an order forensics framework for detecting image operator chain based on convolutional neural network (CNN) is presented. Two-stream CNN architecture is designed to capture both tampering artifact evidence and local noise residual evidence. Specifically, the new CNN-based method is proposed for forensically detecting a chain made of two image operators, which could automatically learn manipulation detection features directly from image data. Further, we empirically investigate the robustness of our proposed method in two practical scenarios: forensic investigators have no access to the operating parameters, and manipulations are applied to a JPEG compressed image. Experimental results show that the proposed framework not only obtains significant detection performance but also can distinguish the order in some cases that previous works were unable to identify.
Cognitive radio technology, a revolutionary communication paradigm that can utilize the existing wireless spectrum resources more efficiently, has been receiving a growing attention in recent years. ...As network users need to adapt their operating parameters to the dynamic environment, who may pursue different goals, traditional spectrum sharing approaches based on a fully cooperative, static, and centralized network environment are no longer applicable. Instead, game theory has been recognized as an important tool in studying, modeling, and analyzing the cognitive interaction process. In this tutorial survey, we introduce the most fundamental concepts of game theory, and explain in detail how these concepts can be leveraged in designing spectrum sharing protocols, with an emphasis on state-of-the-art research contributions in cognitive radio networking. Research challenges and future directions in game theoretic modeling approaches are also outlined. This tutorial survey provides a comprehensive treatment of game theory with important applications in cognitive radio networks, and will aid the design of efficient, self-enforcing, and distributed spectrum sharing schemes in future wireless networks.
In this article, we examine a novel generic network cost minimization problem, in which every node has a local decision vector to optimize. Each node incurs a cost associated with its decision ...vector, while each link incurs a cost related to the decision vectors of its two end nodes. All nodes collaborate to minimize the overall network cost. The formulated network cost minimization problem has broad applications in distributed signal processing and control, in which the notion of link costs often arises. To solve this problem in a decentralized manner, we develop a distributed variant of Newton's method, which possesses faster convergence than alternative first-order optimization methods such as gradient descent and alternating direction method of multipliers. The proposed method is based on an appropriate splitting of the Hessian matrix and an approximation of its inverse, which is used to determine the Newton step. Global linear convergence of the proposed algorithm is established under several standard technical assumptions on the local cost functions. Furthermore, analogous to classical centralized Newton's method, a quadratic convergence phase of the algorithm over a certain time interval is identified. Finally, numerical simulations are conducted to validate the effectiveness of the proposed algorithm and its superiority over other first-order methods, especially when the cost functions are ill-conditioned. Complexity issues of the proposed distributed Newton's method and alternative first-order methods are also discussed.
Dynamic spectrum access in cognitive radio networks can greatly improve the spectrum utilization efficiency. Nevertheless, interference may be introduced to the Primary User (PU) when the Secondary ...Users (SUs) dynamically utilize the PU's licensed channels. If the SUs can be synchronous with the PU's time slots, the interference is mainly due to their imperfect spectrum sensing of the primary channel. However, if the SUs have no knowledge about the PU's exact communication mechanism, additional interference may occur. In this paper, we propose a dynamic spectrum access protocol for the SUs confronting with unknown primary behavior and study the interference caused by their dynamic access. Through analyzing the SUs' dynamic behavior in the primary channel which is modeled as an ON-OFF process, we prove that the SUs' communication behavior is a renewal process. Based on the Renewal Theory, we quantify the interference caused by the SUs and derive the corresponding closed-form expressions. With the interference analysis, we study how to optimize the SUs' performance under the constraints of the PU's communication quality of service (QoS) and the secondary network's stability. Finally, simulation results are shown to verify the effectiveness of our analysis.
Many spectrum sensing methods and dynamic access algorithms have been proposed to improve the secondary users' opportunities of utilizing the primary users' spectrum resources. However, few of them ...have considered to integrate the design of spectrum sensing and access algorithms together by taking into account the mutual influence between them. In this paper, we propose to jointly analyze the spectrum sensing and access problem by studying two scenarios: synchronous scenario where the primary network is slotted and non-slotted asynchronous scenario. Due to selfish nature, secondary users tend to act selfishly to access the channel without contribution to the spectrum sensing. Moreover, they may take out-of-equilibrium strategies because of the uncertainty of others' strategies. To model the complicated interactions among secondary users, we formulate the joint spectrum sensing and access problem as an evolutionary game and derive the evolutionarily stable strategy (ESS) that no one will deviate from. Furthermore, we design a distributed learning algorithm for the secondary users to converge to the ESS. With the proposed algorithm, each secondary user senses and accesses the primary channel with the probabilities learned purely from its own past utility history, and finally achieves the desired ESS. Simulation results shows that our system can quickly converge to the ESS and such an ESS is robust to the sudden unfavorable deviations of the selfish secondary users.
Advances in cognitive radio networks: A survey Beibei Wang; Liu, K J R
IEEE journal of selected topics in signal processing,
2011-Feb., 2011-02-00, 20110201, Letnik:
5, Številka:
1
Journal Article
Recenzirano
Odprti dostop
With the rapid deployment of new wireless devices and applications, the last decade has witnessed a growing demand for wireless radio spectrum. However, the fixed spectrum assignment policy becomes a ...bottleneck for more efficient spectrum utilization, under which a great portion of the licensed spectrum is severely under-utilized. The inefficient usage of the limited spectrum resources urges the spectrum regulatory bodies to review their policy and start to seek for innovative communication technology that can exploit the wireless spectrum in a more intelligent and flexible way. The concept of cognitive radio is proposed to address the issue of spectrum efficiency and has been receiving an increasing attention in recent years, since it equips wireless users the capability to optimally adapt their operating parameters according to the interactions with the surrounding radio environment. There have been many significant developments in the past few years on cognitive radios. This paper surveys recent advances in research related to cognitive radios. The fundamentals of cognitive radio technology, architecture of a cognitive radio network and its applications are first introduced. The existing works in spectrum sensing are reviewed, and important issues in dynamic spectrum allocation and sharing are investigated in detail.
In an indoor environment, there commonly exist a large number of multipaths due to rich scatterers. These multipaths make the indoor positioning problem very challenging. The main reason is that most ...of the transmitted signals are significantly distorted by the multipaths before arriving at the receiver, which causes inaccuracies in the estimation of the positioning features such as the time of arrival (TOA) and the angle of arrival (AOA). On the other hand, the multipath effect can be very constructive when employed in the time-reversal (TR) radio transmission. By utilizing the uniqueness of the multipath profile at each location, TR can create a resonating effect of focusing the energy of the transmitted signal only onto the intended location, which is known as the spatial focusing effect. In this paper, we propose exploiting such a high-resolution focusing effect in the indoor positioning problem. Specifically, we propose a TR indoor positioning system (TRIPS) by utilizing the location-specific characteristic of multipaths. By doing so, we decompose the ill-posed single-access-point (AP) indoor positioning problem into two well-defined subproblems. The first subproblem is to create a database by mapping the physical geographical location with the logical location in the channel impulse response (CIR) space, whereas the second subproblem is to determine the real physical location by matching the estimated CIR with those in the database. To evaluate the performance of our proposed TRIPS, we build a prototype to conduct real experiments. The experimental results show that, with a single AP working in the 5.4-GHz band under the non-line-of-sight (NLOS) condition, our proposed TRIPS can achieve perfect 10-cm localization accuracy with zero-error rate within a 0.9 m by 1 m area of interest.