Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (208)

Search Parameters:
Keywords = full duplex

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
15 pages, 891 KiB  
Article
AIPI: Network Status Identification on Multi-Protocol Wireless Sensor Networks
by Peng Jiang, Xinglin Feng, Renhai Feng and Junpeng Cui
Sensors 2025, 25(5), 1347; https://doi.org/10.3390/s25051347 (registering DOI) - 22 Feb 2025
Abstract
Topology control is important for extending networks lifetime and reducing interference. The accuracy of topology identification plays a crucial role in topology control. Traditional passive interception can only identify the connectivity among cooperative sensor networks with known protocol. This paper proposes a novel [...] Read more.
Topology control is important for extending networks lifetime and reducing interference. The accuracy of topology identification plays a crucial role in topology control. Traditional passive interception can only identify the connectivity among cooperative sensor networks with known protocol. This paper proposes a novel method called Active Interfere and Passive Interception (AIPI) to identify the topology of non-cooperative sensor networks by using both active and passive interceptions. Active interception uses full duplex sensors to disrupt communication until frequency hopped to acquire distance information, and thus, infer their connectivity and calculate the location after modifying error in a non-cooperative sensor network. Passive interception uses Granger causality to infer the connectivity between two communication nodes after getting the time frame structure in physical layer. Passive interception is applied to conserve power consumption after obtaining physical information via active interception. Simulation results indicate that AIPI can identify the topology of non-cooperative sensor networks with a higher accuracy than traditional method. Full article
(This article belongs to the Special Issue Security Issues and Solutions in Sensing Systems and Networks)
21 pages, 783 KiB  
Article
Robust Beamfocusing for Secure NFC with Imperfect CSI
by Weijian Chen, Zhiqiang Wei and Zai Yang
Sensors 2025, 25(4), 1240; https://doi.org/10.3390/s25041240 - 18 Feb 2025
Abstract
In this paper, we consider the issue of the physical layer security (PLS) problem between two nodes, i.e., transmitter (Alice) and receiver (Bob), in the presence of an eavesdropper (Eve) in a near-field communication (NFC) system. Notably, massive multiple-input multiple-output (MIMO) arrays significantly [...] Read more.
In this paper, we consider the issue of the physical layer security (PLS) problem between two nodes, i.e., transmitter (Alice) and receiver (Bob), in the presence of an eavesdropper (Eve) in a near-field communication (NFC) system. Notably, massive multiple-input multiple-output (MIMO) arrays significantly increase array aperture, thereby rendering the eavesdroppers more inclined to lurk near the transmission end. This situation necessitates using near-field channel models to more accurately describe channel characteristics. We consider two schemes with imperfect channel estimation information (CSI). The first scheme involves a conventional multiple-input multiple-output multiple-antenna eavesdropper (MIMOME) setup, where Alice simultaneously transmits information signal and artificial noise (AN). In the second scheme, Bob operates in a full-duplex (FD) mode, with Alice transmitting information signal while Bob emits AN. We then jointly design beamforming and AN vectors to degrade the reception signal quality at Eve, based on the signal-to-interference-plus-noise ratio (SINR) of each node. To tackle the power minimization problem, we propose an iterative algorithm that includes an additional constraint to ensure adherence to specified quality-of-service (QoS) metrics. Additionally, we decompose the robust optimization problem of the two schemes into two sub-problems, with one that can be solved using generalized Rayleigh quotient methods and the other that can be addressed through semi-definite programming (SDP). Finally, our simulation results confirm the viability of the proposed approach and demonstrate the effectiveness of the protection zone for NFC systems operating with CSI. Full article
(This article belongs to the Special Issue Secure Communication for Next-Generation Wireless Networks)
Show Figures

Figure 1

Figure 1
<p>The near-field secure wireless communication system.</p>
Full article ">Figure 2
<p>Convergence behavior of the proposed algorithm for both schemes. (<b>a</b>) When Eve is within the near-field region of Alice. (<b>b</b>) When Eve is within the near-field region of Bob.</p>
Full article ">Figure 3
<p>The average transmit power versus minimum required SINR <math display="inline"><semantics> <msub> <mo>Γ</mo> <mi>Req</mi> </msub> </semantics></math>.</p>
Full article ">Figure 4
<p>(<b>a</b>) The average transmit power versus number of Alice’s antennas <math display="inline"><semantics> <msub> <mi>N</mi> <mi mathvariant="normal">A</mi> </msub> </semantics></math>. (<b>b</b>) The average transmit power versus number of Eve’s antennas <math display="inline"><semantics> <msub> <mi>N</mi> <mi mathvariant="normal">E</mi> </msub> </semantics></math>.</p>
Full article ">Figure 5
<p>The average transmit power versus the distance between Alice and Eve.</p>
Full article ">Figure 6
<p>Normalized power heat maps for Scheme I. (<b>a</b>) Desired signal power. (<b>b</b>) Interference-plus-noise power.</p>
Full article ">Figure 7
<p>Normalized power heat maps for scheme II. (<b>a</b>) Desired signal power. (<b>b</b>) Interference-plus-noise power.</p>
Full article ">
16 pages, 335 KiB  
Article
Beamforming for the Cooperative Non-Orthogonal Multiple Access Transmission with Full-Duplex Relaying with Application to Security Attack
by Duckdong Hwang, Sung Sik Nam, Janghoon Yang and Hyoung-Kyu Song
Sensors 2025, 25(4), 1172; https://doi.org/10.3390/s25041172 - 14 Feb 2025
Abstract
We investigate the cooperative non-orthogonal multiple access (CNOMA) transmission through a full-duplex (FD) decode-and-forward (DaF) mode relay and propose two sub-optimal beamforming schemes for this CNOMA FD relay channel. For the optimization metric, we use the end-to-end information rate based on the mutual [...] Read more.
We investigate the cooperative non-orthogonal multiple access (CNOMA) transmission through a full-duplex (FD) decode-and-forward (DaF) mode relay and propose two sub-optimal beamforming schemes for this CNOMA FD relay channel. For the optimization metric, we use the end-to-end information rate based on the mutual information from information theory. In addition to the pure CNOMA relay channel, the proposed beamforming schemes are applied to the security attack case as well, where an unauthorized eavesdropper tries to overhear the CNOMA transmission. The FD operation incurs the self-interference (SI) at the relay and the DaF mode along with CNOMA transmission forces the weakest link among the links toward three involved nodes to determine the end-to-end throughput. These facts lay the foundation for the designing and optimization of the beamforming vectors at the access point (AP) and at the relay. The first proposed sub-optimal optimization algorithm for the beamformer relies on the quadratically constrained quadratic problem (QCQP) in its central part, and this OCQP is iteratively applied with different interference level values at the near CNOMA user as the constraint term until some conditions for the design objectives are met. In addition to the first algorithm, a zero-forcing-based beamforming algorithm is proposed for a reference scheme. The proposed two algorithms are slightly modified to address the security-attacked CNOMA FD relay channel when a illegal user overhears the legitimate transmission. Simulation results are presented to advocate for the efficiency of the proposed algorithms for the CNOMA channel both with and without a security attack from an eavesdropper. Full article
Show Figures

Figure 1

Figure 1
<p>Cooperative Non-Orthogonal Multiple Access Transmission system through an FDR with 2 user terminals under security attack from the eavesdropper (Eve). The FDR operates in the DaF protocol. The AP and the FDR have multiple antennas while the two user terminals and Eve are equipped with single antennas, respectively. The direct channel from the AP to the far user (<math display="inline"><semantics> <msub> <mi>U</mi> <mn>2</mn> </msub> </semantics></math>) is blocked unlike the near user (<math display="inline"><semantics> <msub> <mi>U</mi> <mn>1</mn> </msub> </semantics></math>) case.</p>
Full article ">Figure 2
<p>Comparison of the sum rate <math display="inline"><semantics> <msub> <mi>R</mi> <mrow> <mi>S</mi> <mi>R</mi> </mrow> </msub> </semantics></math> of the proposed algorithms for the FDR CNOMA channel against the source transmit power with different <math display="inline"><semantics> <msub> <mi>α</mi> <mi>R</mi> </msub> </semantics></math> values when <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <msub> <mi>N</mi> <mi>r</mi> </msub> <mo>=</mo> <msub> <mi>N</mi> <mi>t</mi> </msub> <mo>=</mo> <mn>3</mn> <mo>,</mo> <msub> <mi>P</mi> <mi>r</mi> </msub> <mo>=</mo> <mn>42</mn> <mspace width="4pt"/> <mrow> <mo>(</mo> <mi>dB</mi> <mo>)</mo> </mrow> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mi>R</mi> </msub> <mo>=</mo> <mn>1</mn> <mo>/</mo> <mn>5</mn> </mrow> </semantics></math> or <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mi>R</mi> </msub> <mo>=</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>2</mn> </mrow> </msup> </mrow> </semantics></math>. The path-loss from the FDR to users <math display="inline"><semantics> <msub> <mi>α</mi> <mi>U</mi> </msub> </semantics></math> is set to <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>/</mo> <mn>100</mn> </mrow> </semantics></math> to scale the big <math display="inline"><semantics> <msub> <mi>P</mi> <mi>r</mi> </msub> </semantics></math> values down to realistic levels at users since the <math display="inline"><semantics> <msub> <mi>P</mi> <mi>r</mi> </msub> </semantics></math> values are taken to reflect strong SI power after the analogue SI cancellation.</p>
Full article ">Figure 3
<p>Comparison of the sum rate <math display="inline"><semantics> <msub> <mi>R</mi> <mrow> <mi>S</mi> <mi>R</mi> </mrow> </msub> </semantics></math> of the proposed algorithms for the FDR CNOMA channel against the FDR transmit power with different <math display="inline"><semantics> <msub> <mi>α</mi> <mi>R</mi> </msub> </semantics></math> values when <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <msub> <mi>N</mi> <mi>r</mi> </msub> <mo>=</mo> <msub> <mi>N</mi> <mi>t</mi> </msub> <mo>=</mo> <mn>3</mn> <mo>,</mo> <msub> <mi>P</mi> <mi>s</mi> </msub> <mo>=</mo> <mn>15</mn> <mspace width="4pt"/> <mrow> <mo>(</mo> <mi>dB</mi> <mo>)</mo> </mrow> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mi>R</mi> </msub> <mo>=</mo> <mn>1</mn> <mo>/</mo> <mn>5</mn> </mrow> </semantics></math> or <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mi>R</mi> </msub> <mo>=</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>2</mn> </mrow> </msup> </mrow> </semantics></math>. The path-loss from the FDR to users <math display="inline"><semantics> <msub> <mi>α</mi> <mi>U</mi> </msub> </semantics></math> is set to <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>/</mo> <mn>100</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Comparison of the sum rate <math display="inline"><semantics> <msub> <mi>R</mi> <mrow> <mi>S</mi> <mi>R</mi> </mrow> </msub> </semantics></math> of the proposed algorithms for the FDR CNOMA channel against the number of FDR transmit antennas <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mi>t</mi> </msub> <mo>=</mo> <msub> <mi>N</mi> <mi>r</mi> </msub> </mrow> </semantics></math> with different <math display="inline"><semantics> <msub> <mi>α</mi> <mi>R</mi> </msub> </semantics></math> values when <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mn>3</mn> <mo>,</mo> <mspace width="4pt"/> <msub> <mi>P</mi> <mi>r</mi> </msub> <mo>=</mo> <mn>42</mn> <mspace width="4pt"/> <mrow> <mo>(</mo> <mi>dB</mi> <mo>)</mo> </mrow> <mo>,</mo> <msub> <mi>P</mi> <mi>s</mi> </msub> <mo>=</mo> <mn>15</mn> <mspace width="4pt"/> <mrow> <mo>(</mo> <mi>dB</mi> <mo>)</mo> </mrow> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mi>R</mi> </msub> <mo>=</mo> <mn>1</mn> <mo>/</mo> <mn>5</mn> </mrow> </semantics></math> or <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mi>R</mi> </msub> <mo>=</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>2</mn> </mrow> </msup> </mrow> </semantics></math>. The path-loss from the FDR to users <math display="inline"><semantics> <msub> <mi>α</mi> <mi>U</mi> </msub> </semantics></math> is set to <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>/</mo> <mn>100</mn> </mrow> </semantics></math>. Here, only the points of the integer numbers of antennas are valid ones (simulated ones), though we interpolate those points to make curves.</p>
Full article ">Figure 5
<p>Comparison of the secrecy sum rate <math display="inline"><semantics> <msub> <mi>R</mi> <mrow> <mi>S</mi> <mi>S</mi> <mi>R</mi> </mrow> </msub> </semantics></math> of the proposed algorithms for the FDR CNOMA eavesdropping channel against the source transmit power with different <math display="inline"><semantics> <msub> <mi>α</mi> <mi>R</mi> </msub> </semantics></math> values when <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <msub> <mi>N</mi> <mi>r</mi> </msub> <mo>=</mo> <msub> <mi>N</mi> <mi>t</mi> </msub> <mo>=</mo> <mn>3</mn> <mo>,</mo> <msub> <mi>P</mi> <mi>r</mi> </msub> <mo>=</mo> <mn>42</mn> <mspace width="4pt"/> <mrow> <mo>(</mo> <mi>dB</mi> <mo>)</mo> </mrow> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mi>R</mi> </msub> <mo>=</mo> <mn>1</mn> <mo>/</mo> <mn>5</mn> </mrow> </semantics></math> or <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mi>R</mi> </msub> <mo>=</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>2</mn> </mrow> </msup> </mrow> </semantics></math>. The path-loss from the FDR to users <math display="inline"><semantics> <msub> <mi>α</mi> <mi>U</mi> </msub> </semantics></math> is set to <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>/</mo> <mn>100</mn> </mrow> </semantics></math> to scale the big <math display="inline"><semantics> <msub> <mi>P</mi> <mi>r</mi> </msub> </semantics></math> values down to realistic levels at users since the <math display="inline"><semantics> <msub> <mi>P</mi> <mi>r</mi> </msub> </semantics></math> values are taken to reflect strong SI power after the analogue SI cancellation.</p>
Full article ">Figure 6
<p>Comparison of the secrecy sum rate <math display="inline"><semantics> <msub> <mi>R</mi> <mrow> <mi>S</mi> <mi>S</mi> <mi>R</mi> </mrow> </msub> </semantics></math> of the proposed algorithms for the FDR CNOMA eavesdropping channel against the FDR transmit power with different <math display="inline"><semantics> <msub> <mi>α</mi> <mi>R</mi> </msub> </semantics></math> values when <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <msub> <mi>N</mi> <mi>r</mi> </msub> <mo>=</mo> <msub> <mi>N</mi> <mi>t</mi> </msub> <mo>=</mo> <mn>3</mn> <mo>,</mo> <msub> <mi>P</mi> <mi>s</mi> </msub> <mo>=</mo> <mn>15</mn> <mspace width="4pt"/> <mrow> <mo>(</mo> <mi>dB</mi> <mo>)</mo> </mrow> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mi>R</mi> </msub> <mo>=</mo> <mn>1</mn> <mo>/</mo> <mn>5</mn> </mrow> </semantics></math> or <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mi>R</mi> </msub> <mo>=</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>2</mn> </mrow> </msup> </mrow> </semantics></math>. The path-loss from the FDR to users <math display="inline"><semantics> <msub> <mi>α</mi> <mi>U</mi> </msub> </semantics></math> is set to <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>/</mo> <mn>100</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>Comparison of the secrecy sum rate <math display="inline"><semantics> <msub> <mi>R</mi> <mrow> <mi>S</mi> <mi>S</mi> <mi>R</mi> </mrow> </msub> </semantics></math> of the proposed algorithms for the FDR CNOMA eavesdropping channel against the number of FDR transmit antennas <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mi>t</mi> </msub> <mo>=</mo> <msub> <mi>N</mi> <mi>r</mi> </msub> </mrow> </semantics></math> with different <math display="inline"><semantics> <msub> <mi>α</mi> <mi>R</mi> </msub> </semantics></math> values when <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mn>3</mn> <mo>,</mo> <msub> <mi>P</mi> <mi>r</mi> </msub> <mo>=</mo> <mn>42</mn> <mspace width="4pt"/> <mrow> <mo>(</mo> <mi>dB</mi> <mo>)</mo> </mrow> <mo>,</mo> <msub> <mi>P</mi> <mi>s</mi> </msub> <mo>=</mo> <mn>15</mn> <mspace width="4pt"/> <mrow> <mo>(</mo> <mi>dB</mi> <mo>)</mo> </mrow> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mi>R</mi> </msub> <mo>=</mo> <mn>1</mn> <mo>/</mo> <mn>5</mn> </mrow> </semantics></math> or <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mi>R</mi> </msub> <mo>=</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>2</mn> </mrow> </msup> </mrow> </semantics></math>. The path-loss from the FDR to users <math display="inline"><semantics> <msub> <mi>α</mi> <mi>U</mi> </msub> </semantics></math> is set to <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>/</mo> <mn>100</mn> </mrow> </semantics></math>. Here, only the points of the integer numbers of antennas are valid ones (simulated ones), though we interpolate those points to make curves.</p>
Full article ">
20 pages, 1044 KiB  
Article
Reliable Transmission of Energy Harvesting Full-Duplex Relay Systems with Short-Packet Communications
by Chenxi Yang, Mingkang Yu, Jinshu Huang, Dechuan Chen, Jin Li and Pei Jiang
Symmetry 2025, 17(2), 281; https://doi.org/10.3390/sym17020281 - 12 Feb 2025
Abstract
Energy harvesting (EH) from radio frequency (RF) signals provides a promising approach for supplying sustainable and convenient energy to low-power Internet of Things (IoT) devices. In this work, we investigate short-packet communications in a full-duplex (FD) relay system, where RF signals from a [...] Read more.
Energy harvesting (EH) from radio frequency (RF) signals provides a promising approach for supplying sustainable and convenient energy to low-power Internet of Things (IoT) devices. In this work, we investigate short-packet communications in a full-duplex (FD) relay system, where RF signals from a source are utilized to power an energy-constrained relay through the time switching protocol. Specifically, hardware impairments in each node and residual self-interference caused by FD are jointly considered. To ensure reliable transmission, two antennas are symmetrically arranged according to the position of the relay station, both of which are used for energy harvesting. Furthermore, we explored two practical schemes based on symmetric channel correlation, i.e., an independent channel for energy harvesting and an identical channel for energy harvesting. For both scenarios, we derive closed-form approximations for the overall average block error rate (BLER) and effective throughput. The validity of our analysis is confirmed through computer simulations, demonstrating that the proposed scheme enhances the reliability and throughput of the system compared with the existing scheme in the literature at low transmission rates and transmit signal-to-noise-ratios (SNRs). Full article
(This article belongs to the Special Issue Symmetry/Asymmetry in Future Wireless Networks)
Show Figures

Figure 1

Figure 1
<p>System model.</p>
Full article ">Figure 2
<p>The time switching protocol.</p>
Full article ">Figure 3
<p>(<b>a</b>) Overall average BLER and (<b>b</b>) the corresponding percentage reliability improvement compared with the existing scheme in [<a href="#B25-symmetry-17-00281" class="html-bibr">25</a>] versus the transmit SNR <math display="inline"><semantics> <mi>λ</mi> </semantics></math> with <math display="inline"><semantics> <mrow> <mi>b</mi> <mo>=</mo> <mn>300</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Overall average BLER versus the number of channels <math display="inline"><semantics> <msub> <mi>u</mi> <mi>R</mi> </msub> </semantics></math> with <math display="inline"><semantics> <mrow> <mi>λ</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math> dB.</p>
Full article ">Figure 5
<p>Overall average BLER versus the level of hardware impairments <math display="inline"><semantics> <msub> <mi>k</mi> <mn>1</mn> </msub> </semantics></math> with <math display="inline"><semantics> <mrow> <msub> <mi>k</mi> <mn>2</mn> </msub> <mo>=</mo> <msub> <mi>k</mi> <mn>1</mn> </msub> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>b</mi> <mo>=</mo> <mn>400</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>Overall average BLER versus the number of channels <math display="inline"><semantics> <msub> <mi>L</mi> <mi>e</mi> </msub> </semantics></math> with <math display="inline"><semantics> <mrow> <mi>b</mi> <mo>=</mo> <mn>400</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>Effective throughput versus the number of channels <math display="inline"><semantics> <msub> <mi>u</mi> <mi>R</mi> </msub> </semantics></math> with <math display="inline"><semantics> <mrow> <mi>λ</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> dB.</p>
Full article ">Figure 8
<p>(<b>a</b>) Throughput and (<b>b</b>) the corresponding percentage throughput improvement compared with the existing scheme in [<a href="#B25-symmetry-17-00281" class="html-bibr">25</a>] versus the transmit SNR <math display="inline"><semantics> <mi>λ</mi> </semantics></math> with different transmission rates.</p>
Full article ">
22 pages, 5134 KiB  
Article
Reinforcement Learning-Based Resource Allocation Scheme of NR-V2X Sidelink for Joint Communication and Sensing
by Zihan Li, Ping Wang, Yamin Shen and Song Li
Sensors 2025, 25(2), 302; https://doi.org/10.3390/s25020302 - 7 Jan 2025
Viewed by 299
Abstract
Joint communication and sensing (JCS) is becoming an important trend in 6G, owing to its efficient utilization of spectrums and hardware resources. Utilizing echoes of the same signal can achieve the object location sensing function, in addition to the V2X communication function. There [...] Read more.
Joint communication and sensing (JCS) is becoming an important trend in 6G, owing to its efficient utilization of spectrums and hardware resources. Utilizing echoes of the same signal can achieve the object location sensing function, in addition to the V2X communication function. There is application potential for JCS systems in the fields of ADAS and unmanned autos. Currently, the NR-V2X sidelink has been standardized by 3GPP to support low-latency high-reliability direct communication. In order to combine the benefits of both direct communication and JCS, it is promising to extend existing NR-V2X sidelink communication toward sidelink JCS. However, conflicting performance requirements arise between radar sensing accuracy and communication reliability with the limited sidelink spectrum. In order to overcome the challenges in the distributed resource allocation of sidelink JCS with a full-duplex, this paper has proposed a novel consecutive-collision mitigation semi-persistent scheduling (CCM-SPS) scheme, including the collision detection and Q-learning training stages to suppress collision probabilities. Theoretical performance analyses on Cramér–Rao Lower Bounds (CRLBs) have been made for the sensing of sidelink JCS. Key performance metrics such as CRLB, PRR and UD have been evaluated. Simulation results show the superior performance of CCM-SPS compared to similar solutions, with promising application prospects. Full article
(This article belongs to the Special Issue Communication, Sensing and Localization in 6G Systems)
Show Figures

Figure 1

Figure 1
<p>NG-RAN architecture supporting the PC5 interface.</p>
Full article ">Figure 2
<p>Process flow of sensing-based semi-persistent scheduling (SB-SPS).</p>
Full article ">Figure 3
<p>Markov chain for state transition of SPS.</p>
Full article ">Figure 4
<p>Reinforcement learning framework.</p>
Full article ">Figure 5
<p>CCM-SPS accelerate reselection.</p>
Full article ">Figure 6
<p>Empirical CDF of the root CRLB for a range using SB-SPS, FD-enhanced and CCM-SPS.</p>
Full article ">Figure 7
<p>Bar graph of root CRLB (at CCDF = 95-percentile) for a range using different schemes with varying vehicle densities.</p>
Full article ">Figure 8
<p>PRR over distance using SB-SPS, FD-enhanced and CCM-SPS.</p>
Full article ">Figure 9
<p>The maximum distance allowing PRR larger than 0.95 is evaluated using conventional SB-SPS, FD-enhanced methods and CCM-SPS.</p>
Full article ">Figure 10
<p>Empirical CDF of root CRLB for range estimation.</p>
Full article ">Figure 11
<p>PRR vs. distance performance of SB-SPS with different pack sizes in case of density = 50, 150, 250 veh/km.</p>
Full article ">Figure 12
<p>CCM-SPS’s range sensing performance evaluation on empirical CDF of root CRLB with different pack sizes in the case of density = 50, 150, 250 veh/km.</p>
Full article ">Figure 13
<p>PRR vs. distance performance of CCM-SPS with different pack sizes in case of density = 50, 150, 250 veh/km.</p>
Full article ">Figure 14
<p>CCM-SPS’s communication performance evaluation on empirical CDF of update delay with different pack sizes in the case of density = 50, 150, 250 veh/km.</p>
Full article ">
17 pages, 952 KiB  
Article
A Power Analysis Method for Self-Interference Signal Components in Full-Duplex Transceivers Under Constant/Nonconstant Modulus Signal Stimulation
by Jia Sun, Jinping Huang, Yonghong Liu, Xizhang Wei, Jingtong Lai and Jie Xiao
Electronics 2024, 13(24), 4961; https://doi.org/10.3390/electronics13244961 - 17 Dec 2024
Viewed by 616
Abstract
The existence of multiple self-interference (SI) signal components, particularly the nonlinear ones, seriously constrains the performance of self-interference cancellation (SIC) methods. To decrease the complexity of SIC methods in full-duplex devices, this article proposes a power analysis method for SI signal components in [...] Read more.
The existence of multiple self-interference (SI) signal components, particularly the nonlinear ones, seriously constrains the performance of self-interference cancellation (SIC) methods. To decrease the complexity of SIC methods in full-duplex devices, this article proposes a power analysis method for SI signal components in a full-duplex transceiver. The proposed method comprises a separate analysis algorithm and a system-level power model. Initially, the algorithm is conducted to obtain the spectrum of the linear and nonlinear components in the power amplifier (PA) output signal. Once the linear-to-nonlinear power ratio (LNPR) has been obtained, a system-level power model is constructed by taking both the transmitter noise and analog-to-digital converter (ADC) quantization noise into account. The proposed power model allows for the allocation of SIC method performance in multiple domains during the design of full-duplex transceivers at the top level, thereby reducing the overall system complexity. The simulation results demonstrate that in a full-duplex transceiver with only antenna isolation, the power of the SI signal component is susceptible to alterations due to the operating waveform and transmission power. Finally, the accuracy of the power analysis method is verified through measurement and Simulink. Full article
Show Figures

Figure 1

Figure 1
<p>The full-duplex transceiver structure diagram.</p>
Full article ">Figure 2
<p>Measurement framework design. (<b>a</b>) Principle block diagram. (<b>b</b>) Physical connection.</p>
Full article ">Figure 3
<p>The NMSE variation under different input power and signals.</p>
Full article ">Figure 4
<p>The spectrum of signal components when PA operating at linear region. (<b>a</b>) Under OFDM stimulation. (<b>b</b>) Under LFM stimulation. (<b>c</b>) Under LFMCW stimulation.</p>
Full article ">Figure 5
<p>The spectrum of signal components when PA operating at 1 dB compression point. (<b>a</b>) Under OFDM stimulation. (<b>b</b>) Under LFM stimulation. (<b>c</b>) Under LFMCW stimulation.</p>
Full article ">Figure 6
<p>The transceiver simulation platform based on Simulink.</p>
Full article ">Figure 7
<p>The transceiver module block diagram.</p>
Full article ">Figure 8
<p>The power of various signal components under constant modulus signal stimulation. (<b>a</b>) Transmit power fixed. (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> </mrow> </semantics></math> 0 dB. (<b>c</b>) SOI power fixed.</p>
Full article ">Figure 9
<p>Comparison between power model and Simulink under constant modulus signal.</p>
Full article ">Figure 10
<p>The power of various signal components under nonconstant modulus signal stimulation. (<b>a</b>) Transmit power fixed. (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math> dB. (<b>c</b>) SOI power fixed.</p>
Full article ">Figure 11
<p>Comparison between power model and Simulink under nonconstant modulus signal.</p>
Full article ">
27 pages, 624 KiB  
Article
Simultaneously Transmitting and Reflecting Reconfigurable Intelligent Surfaces Empowered Cooperative Rate Splitting with User Relaying
by Kangchun Zhao, Yijie Mao and Yuanming Shi
Entropy 2024, 26(12), 1019; https://doi.org/10.3390/e26121019 - 26 Nov 2024
Viewed by 675
Abstract
In this work, we unveil the advantages of synergizing cooperative rate splitting (CRS) with user relaying and simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR RIS). Specifically, we propose a novel STAR RIS-assisted CRS transmission framework, featuring six unique transmission modes that leverage [...] Read more.
In this work, we unveil the advantages of synergizing cooperative rate splitting (CRS) with user relaying and simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR RIS). Specifically, we propose a novel STAR RIS-assisted CRS transmission framework, featuring six unique transmission modes that leverage various combinations of the relaying protocols (including full duplex-FD and half duplex-HD) and the STAR RIS configuration protocols (including energy splitting-ES, mode switching-MS, and time splitting-TS). With the objective of maximizing the minimum user rate, we then propose a unified successive convex approximation (SCA)-based alternative optimization (AO) algorithm to jointly optimize the transmit active beamforming, common rate allocation, STAR RIS passive beamforming, as well as time allocation (for HD or TS protocols) subject to the transmit power constraint at the base station (BS) and the law of energy conservation at the STAR RIS. To alleviate the computational burden, we further propose a low-complexity algorithm that incorporates a closed-form passive beamforming design. Numerical results show that our proposed framework significantly enhances user fairness compared with conventional CRS schemes without STAR RIS or other STAR RIS-empowered multiple access schemes. Moreover, the proposed low-complexity algorithm dramatically reduces the computational complexity while achieving very close performance to the AO method. Full article
Show Figures

Figure 1

Figure 1
<p>The transmission architecture of the proposed STAR RIS-assisted CRS.</p>
Full article ">Figure 2
<p>Six transmission modes of the proposed STAR RIS-assisted CRS.</p>
Full article ">Figure 3
<p>Max-min rate versus the number of STAR RIS elements <span class="html-italic">N</span>, <math display="inline"><semantics> <mrow> <mi>SNR</mi> <mo>=</mo> <mn>20</mn> <mspace width="3.33333pt"/> <mi>dB</mi> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mi>t</mi> </msub> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Max-min rate versus SNR, <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>50</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mi>t</mi> </msub> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Max-minrate versus SNR, <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>50</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mi>t</mi> </msub> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>The performance of Algorithm 3 and 4. (<b>a</b>) Max-min rate versus <span class="html-italic">N</span>. (<b>b</b>) Average CPU time versus <span class="html-italic">N</span>.</p>
Full article ">Figure 7
<p>Ergodic max-min rate versus the number of STAR RIS elements <span class="html-italic">N</span>, <math display="inline"><semantics> <mrow> <mi>SNR</mi> <mo>=</mo> <mn>20</mn> <mspace width="3.33333pt"/> <mi>dB</mi> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mi>t</mi> </msub> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>κ</mi> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics></math>.</p>
Full article ">
14 pages, 554 KiB  
Article
Location-Based Relay Selection in Full-Duplex Random Relay Networks
by Jonghyun Bang and Taehyoung Kim
Appl. Sci. 2024, 14(22), 10626; https://doi.org/10.3390/app142210626 - 18 Nov 2024
Viewed by 511
Abstract
Full-duplex relay (FDR) has attracted considerable interest in enhancing the performance of relay networks by utilizing resources more efficiently. In this paper, we propose a framework for full-duplex random relay networks (FDRRNs), where relay nodes equipped with full-duplex (FD) capability are randomly distributed [...] Read more.
Full-duplex relay (FDR) has attracted considerable interest in enhancing the performance of relay networks by utilizing resources more efficiently. In this paper, we propose a framework for full-duplex random relay networks (FDRRNs), where relay nodes equipped with full-duplex (FD) capability are randomly distributed within a finite two-dimensional region. We first derive the outage probability of an FDRRN and then identify the potential relay location that minimizes the outage probability. Furthermore, we introduce a low-complexity relay selection algorithm that selects the relay node nearest to the potential relay location. Finally, simulation results show that the proposed relay selection algorithm achieves performance comparable to that of the max-min relay selection algorithm. Full article
(This article belongs to the Special Issue Signal Processing and Communication for Wireless Sensor Network)
Show Figures

Figure 1

Figure 1
<p>An example of an FDRRN. Red circles and squares are the transmitter and receiver nodes, respectively. In addition, black circles with dotted lines and solid lines are the candidate and selected relay nodes, respectively. Also, the dotted red line denotes SI in a relay node.</p>
Full article ">Figure 2
<p>The potential relay locations of an FDRRN as a function of the residual SI. The residual SI increases from <math display="inline"><semantics> <mrow> <mo>−</mo> <mn>45</mn> </mrow> </semantics></math> dB to <math display="inline"><semantics> <mrow> <mo>−</mo> <mn>110</mn> </mrow> </semantics></math> dB.</p>
Full article ">Figure 3
<p>The outage probability of an FDRRN as a function of the spatial interference density, including both the numerical and simulation results. The spatial density of interference is the same for each relay hop, i.e., <math display="inline"><semantics> <mrow> <msub> <mi>λ</mi> <mn>1</mn> </msub> <mo>=</mo> <msub> <mi>λ</mi> <mn>2</mn> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>The outage probability of an FDRRN as a function of the density of the candidate relay nodes for different residual SI values, <math display="inline"><semantics> <msub> <mi>I</mi> <mrow> <mi>S</mi> <mi>I</mi> </mrow> </msub> </semantics></math>.</p>
Full article ">Figure 5
<p>The outage probability of an FDRRN as a function of the density of the candidate relay nodes for the proposed, <span class="html-italic">max-min</span>, and optimal relay selection algorithms.</p>
Full article ">Figure 6
<p>The outage probability of an FDRRN as a function of the density of the candidate relay nodes for the proposed, <span class="html-italic">max-min</span>, and optimal relay selection algorithms for different path-loss exponents, <math display="inline"><semantics> <mi>α</mi> </semantics></math>.</p>
Full article ">Figure 7
<p>The outage probability of an FDRRN as a function of the density of the candidate relay nodes for different SIR thresholds, <math display="inline"><semantics> <mi>τ</mi> </semantics></math>.</p>
Full article ">Figure 8
<p>The achievable spectral efficiency of an FDRRN as a function of the density of the candidate relay nodes for the proposed, <span class="html-italic">max-min</span>, and optimal relay selection algorithms.</p>
Full article ">
17 pages, 22813 KiB  
Article
Effect of Oxide’s Thermophysical Properties on 2205 Duplex Stainless Steels ATIG Welds
by Rachid Djoudjou, Kamel Touileb, Elawady Attia, Abousoufiane Ouis, Abdeljlil Chihaoui Hedhibi, Hany S. Abdo and Ibrahim AlBaijan
Crystals 2024, 14(11), 973; https://doi.org/10.3390/cryst14110973 - 10 Nov 2024
Viewed by 1028
Abstract
Duplex stainless-steel grade 2205 (2205 DSS) is the most widely used of the current duplex materials. The duplex steel alloy is characterized by high strength and high corrosion resistance through enhancing nitrogen and molybdenum contents. The activated tungsten inert gas (ATIG) welding technique [...] Read more.
Duplex stainless-steel grade 2205 (2205 DSS) is the most widely used of the current duplex materials. The duplex steel alloy is characterized by high strength and high corrosion resistance through enhancing nitrogen and molybdenum contents. The activated tungsten inert gas (ATIG) welding technique uses the same equipment as tungsten inert gas (TIG), but prior to the welding operation, a thin layer of flux is deposited. Activation fluxes are known to influence the shape and energy characteristics of the arc. They promote the change in shapes and dimensions of the welds, namely, increasing the depth and narrowing the weld width. This work is dedicated to investigate the influence of the thermophysical properties of individual metal oxide fluxes on 2205 DSS welding morphology. It helps also to identify the recommended flux properties in order to perform full penetrated ATIG welds. Thirteen kinds of oxides (SiO2, TiO2, Fe2O3, Cr2O3, ZnO, Mn2O3, V2O5, MoO3, Co3O4, SrO, ZrO2, CaO, and MgO) have been tested and three current intensity levels (120, 150 and 180 A) have been considered. The results showed that the main input factors affecting the weld depth (D) were the welding current intensity with a contribution of up to 53.36%, followed by the oxides enthalpy energy with 15.05% and then by the difference between the oxides and the base metal of 2205 DSS (BM 2205 DSS) melting points with a contribution of 9.71% of the data variance. The conditions on individual oxides’ thermophysical properties to achieve full penetrated weld beads have been also revealed. Full article
Show Figures

Figure 1

Figure 1
<p>Performance of the model for depth penetration (D): (<b>a</b>) residuals’ normal plot for D. (<b>b</b>) Predicted vs. actual data for D.</p>
Full article ">Figure 2
<p>Effect of oxide melting point.</p>
Full article ">Figure 3
<p>Effect of the oxide and the base materials melting points difference in relation with the current intensity.</p>
Full article ">Figure 4
<p>Effect of oxygen proportion in oxide and current intensity on weld depth.</p>
Full article ">Figure 5
<p>Effect of oxide energy of ionization and current intensity on weld depth.</p>
Full article ">Figure 6
<p>Effect of enthalpy energy of formation of oxides <math display="inline"><semantics> <mrow> <msubsup> <mrow> <mo>∆</mo> <mi mathvariant="normal">H</mi> </mrow> <mrow> <mn>298</mn> </mrow> <mrow> <mo>°</mo> </mrow> </msubsup> </mrow> </semantics></math> (KJ/mol) and current intensity on weld depth.</p>
Full article ">Figure 7
<p>Model fit for aspect ratio for aspect ratio (D/W). (<b>a</b>) Residuals’ normal plot for D/W. (<b>b</b>) Actual data vs. predicted for D/W.</p>
Full article ">
19 pages, 555 KiB  
Article
Multi-Agent DRL for Air-to-Ground Communication Planning in UAV-Enabled IoT Networks
by Khalid Ibrahim Qureshi, Bingxian Lu, Cheng Lu, Muhammad Ali Lodhi and Lei Wang
Sensors 2024, 24(20), 6535; https://doi.org/10.3390/s24206535 - 10 Oct 2024
Cited by 1 | Viewed by 1076
Abstract
In this paper, we present a novel method to enhance the sum-rate effectiveness in full-duplex unmanned aerial vehicle (UAV)-assisted communication networks. Existing approaches often couple uplink and downlink associations, resulting in suboptimal performance, particularly in dynamic environments where user demands and network conditions [...] Read more.
In this paper, we present a novel method to enhance the sum-rate effectiveness in full-duplex unmanned aerial vehicle (UAV)-assisted communication networks. Existing approaches often couple uplink and downlink associations, resulting in suboptimal performance, particularly in dynamic environments where user demands and network conditions are unpredictable. To overcome these limitations, we propose a decoupling of uplink and downlink associations for ground-based users (GBUs), significantly improving network efficiency. We formulate a comprehensive optimization problem that integrates UAV trajectory design and user association, aiming to maximize the overall sum-rate efficiency of the network. Due to the problem’s non-convexity, we reformulate it as a Partially Observable Markov Decision Process (POMDP), enabling UAVs to make real-time decisions based on local observations without requiring complete global information. Our framework employs multi-agent deep reinforcement learning (MADRL), specifically the Multi-Agent Deep Deterministic Policy Gradient (MADDPG) algorithm, which balances centralized training with distributed execution. This allows UAVs to efficiently learn optimal user associations and trajectory controls while dynamically adapting to local conditions. The proposed solution is particularly suited for critical applications such as disaster response and search and rescue missions, highlighting the practical significance of utilizing UAVs for rapid network deployment in emergencies. By addressing the limitations of existing centralized and distributed solutions, our hybrid model combines the benefits of centralized training with the adaptability of distributed inference, ensuring optimal UAV operations in real-time scenarios. Full article
Show Figures

Figure 1

Figure 1
<p>Separate uplink and downlink association in full-duplex communication for ground user.</p>
Full article ">Figure 2
<p>Network model illustrating the communication setup with one GBS, multiple UAVs serving as FBS, and GBUs. The figure depicts both LoS and NLoS links, as well as uplink and downlink transmissions between GBUs and UAVs.</p>
Full article ">Figure 3
<p>MADRL framework for Multi-UAV network.</p>
Full article ">Figure 4
<p>Frequency of association of each FBS during four timeslots.</p>
Full article ">Figure 5
<p>UAV flight trajectories during time <span class="html-italic">T</span>.</p>
Full article ">Figure 6
<p>Accumulated Reward based on different association methods.</p>
Full article ">Figure 7
<p>Accumulated reward with different learning rates.</p>
Full article ">Figure 8
<p>Comparison of proposed algorithm with different algorithms.</p>
Full article ">Figure 9
<p>Accumulated reward with different heights of UAVs.</p>
Full article ">
22 pages, 4119 KiB  
Review
Dual-Band Passive Beam Steering Antenna Technologies for Satellite Communication and Modern Wireless Systems: A Review
by Maira I. Nabeel, Khushboo Singh, Muhammad U. Afzal, Dushmantha N. Thalakotuna and Karu P. Esselle
Sensors 2024, 24(18), 6144; https://doi.org/10.3390/s24186144 - 23 Sep 2024
Cited by 2 | Viewed by 2104
Abstract
Efficient beam steerable high-gain antennas enable high-speed data rates over long-distance networks, including wireless backhaul, satellite communications (SATCOM), and SATCOM On-the-Move. These characteristics are essential for advancing contemporary wireless communication networks, particularly within 5G and beyond. Various beam steering solutions have been proposed [...] Read more.
Efficient beam steerable high-gain antennas enable high-speed data rates over long-distance networks, including wireless backhaul, satellite communications (SATCOM), and SATCOM On-the-Move. These characteristics are essential for advancing contemporary wireless communication networks, particularly within 5G and beyond. Various beam steering solutions have been proposed in the literature, with passive beam steering mechanisms employing planar metasurfaces emerging as cost-effective, power-efficient, and compact options. These attributes make them well-suited for use in confined spaces, large-scale production and widespread distribution to meet the demands of the mass market. Utilizing a dual-band antenna terminal setup is often advantageous for full duplex communication in wireless systems. Therefore, this article presents a comprehensive review of the dual-band beam steering techniques for enabling full-duplex communication in modern wireless systems, highlighting their design methodologies, scanning mechanisms, physical characteristics, and constraints. Despite the advantages of planar metasurface-based beam steering solutions, the literature on dual-band beam steering antennas supporting full duplex communication is limited. This review article identifies research gaps and outlines future directions for developing economically feasible passive dual-band beam steering solutions for mass deployment. Full article
Show Figures

Figure 1

Figure 1
<p>The modern wireless communication landscape.</p>
Full article ">Figure 2
<p>Classification of beam steering techniques.</p>
Full article ">Figure 3
<p>Commercially available antennas for SOTM and COTM applications. (<b>a</b>) Electronically Steered Antenna by Kymeta [<a href="#B43-sensors-24-06144" class="html-bibr">43</a>,<a href="#B44-sensors-24-06144" class="html-bibr">44</a>], (<b>b</b>) Mechanically Steered Antennas by Honeywell [<a href="#B45-sensors-24-06144" class="html-bibr">45</a>]. (<b>c</b>) Metasurface Antenna by Waveup [<a href="#B46-sensors-24-06144" class="html-bibr">46</a>].</p>
Full article ">Figure 4
<p>Dual-band metasurface based beam steering techniques.</p>
Full article ">Figure 5
<p>Analogy between an antenna array and array of cells arranged in a metasurface to exhibit a transmission phase gradient.</p>
Full article ">Figure 6
<p>Different phase transformation cell topologies based on their implemented structure. (<b>a</b>) An all-dielectric multiwavelength cell [<a href="#B83-sensors-24-06144" class="html-bibr">83</a>], (<b>b</b>) a dual-band all metal cell [<a href="#B31-sensors-24-06144" class="html-bibr">31</a>], and (<b>c</b>) a dual-band composite cell redrawn based on the structure reported in [<a href="#B32-sensors-24-06144" class="html-bibr">32</a>].</p>
Full article ">Figure 7
<p>Unit cell simulations in CST, periodic in <span class="html-italic">x</span> and <span class="html-italic">y</span> axes, open in <span class="html-italic">z</span> axis with Floquet mode excitation.</p>
Full article ">Figure 8
<p>Different types of dual-band phase shifting cells. (<b>a</b>) Multilayer cells based on the selection of optimized phase pairs corresponding to the desired response in the dual-frequency bands [<a href="#B59-sensors-24-06144" class="html-bibr">59</a>,<a href="#B84-sensors-24-06144" class="html-bibr">84</a>], (<b>b</b>) interleaving resonant elements corresponding to each frequency [<a href="#B31-sensors-24-06144" class="html-bibr">31</a>,<a href="#B60-sensors-24-06144" class="html-bibr">60</a>], (<b>c</b>) dual-band phase rotation cell [<a href="#B61-sensors-24-06144" class="html-bibr">61</a>], and (<b>d</b>) a concentric cell using orthogonal polarized modified split rings and Jerusalem cross [<a href="#B67-sensors-24-06144" class="html-bibr">67</a>].</p>
Full article ">Figure 9
<p>Summary of techniques to design a dual-band unit cell for passive phase-gradient metasurfaces.</p>
Full article ">
12 pages, 3990 KiB  
Article
Design of a Novel RFID Reader for Oilwell Downhole Applications
by Qixuan Hu, Yuesong Yang and Jixuan Zhu
Appl. Sci. 2024, 14(16), 7372; https://doi.org/10.3390/app14167372 - 21 Aug 2024
Cited by 1 | Viewed by 773
Abstract
RFID (Radio Frequency Identification), which transmits control data through electronic tags in a non-contact manner, provides a new approach for efficient and low-cost remote control of oil downhole tools. However, the interference of harsh downhole environments and the high-speed movement of tags seriously [...] Read more.
RFID (Radio Frequency Identification), which transmits control data through electronic tags in a non-contact manner, provides a new approach for efficient and low-cost remote control of oil downhole tools. However, the interference of harsh downhole environments and the high-speed movement of tags seriously affect the performance of the current downhole reader. To effectively address this issue, in this study, a novel downhole RFID reader is presented. By introducing the half-duplex communication protocol to replace the current full-duplex communication protocol in the hardware circuits of the reader, its tag recognition ability can be improved. Then, the corresponding hardware circuits and software programs are designed. Furthermore, a sparse solenoid antenna is adopted to replace the traditional tightly wound solenoid antenna, which can provide a longer reading area range to cope with the high-moving tag, and its total length and spacing parameters between adjacent coils are designed in detail. The test results show that the proposed RFID reader based on a half-duplex communication protocol can communicate with tags normally, and its sparse solenoid antenna provides significantly more tag reading times than traditional tightly wound solenoid antennas under the same antenna inductance. Full article
(This article belongs to the Special Issue Advances in Wireless Communication Technologies)
Show Figures

Figure 1

Figure 1
<p>Downhole RFID system.</p>
Full article ">Figure 2
<p>Hardware block diagram of RFID reader.</p>
Full article ">Figure 3
<p>Circuit connection diagram of MIC4452.</p>
Full article ">Figure 4
<p>XR2211 demodulation circuit.</p>
Full article ">Figure 5
<p>Decoding flowchart of tag data.</p>
Full article ">Figure 6
<p>Sparse solenoid antenna structure.</p>
Full article ">Figure 7
<p>Magnetic field strength in various directions of the sparse solenoid antenna. (<b>a</b>) Hx, (<b>b</b>) Hy, (<b>c</b>) Hz, (<b>d</b>) Total magnetic field strength H.</p>
Full article ">Figure 8
<p>The effect of different antenna length on magnetic field strength. (<b>a</b>) <span class="html-italic">l</span> = 0.6 m, (<b>b</b>) <span class="html-italic">l</span> = 0.8 m, (<b>c</b>) <span class="html-italic">l</span> = 1.0 m, (<b>d</b>) <span class="html-italic">h</span> = 1.2 m.</p>
Full article ">Figure 9
<p>The effect of different adjacent winding spacing <span class="html-italic">h</span> on magnetic field strength. (<b>a</b>) <span class="html-italic">h</span> = 0.25 cm, (<b>b</b>) <span class="html-italic">h</span> = 0.5 cm, (<b>c</b>) <span class="html-italic">h</span> = 0.75 cm, (<b>d</b>) <span class="html-italic">h</span> = 1.0 cm.</p>
Full article ">Figure 10
<p>(<b>a</b>) Experimental test system. (<b>b</b>) 134.2 kHz modulated signal. (<b>c</b>) Demodulated signal.</p>
Full article ">Figure 11
<p>Measurement waveform of tag reading cycle.</p>
Full article ">
20 pages, 11618 KiB  
Article
MmWave Tx-Rx Self-Interference Suppression through a High Impedance Surface Stacked EBG
by Adewale K. Oladeinde, Ehsan Aryafar and Branimir Pejcinovic
Electronics 2024, 13(15), 3067; https://doi.org/10.3390/electronics13153067 - 2 Aug 2024
Viewed by 889
Abstract
This paper proposes a full-duplex (FD) antenna design with passive self-interference (SI) suppression for the 28 GHz mmWave band. The reduction in SI is achieved through the design of a novel configuration of stacked Electromagnetic Band Gap structures (EBGs), which create a high [...] Read more.
This paper proposes a full-duplex (FD) antenna design with passive self-interference (SI) suppression for the 28 GHz mmWave band. The reduction in SI is achieved through the design of a novel configuration of stacked Electromagnetic Band Gap structures (EBGs), which create a high impedance path to travelling electromagnetic waves between the transmit and receive antenna elements. The EBG is composed of stacked patches on layers 1 and 2 of a four-layer stack-up configuration. We present the design, optimization, and prototyping of unit antenna elements, stacked EBGs, and integration of stacked EBGs with antenna elements. We also evaluate the design through both HFSS (High Frequency Structure Simulator) and over-the-air measurements in an anechoic chamber. Through extensive evaluations, we show that (i) compared to an architecture that does not use EBGs, the proposed novel stacked EBG design provides an average of 25 dB of additional reduction in SI over 1 GHz of bandwidth, (ii) unit antenna element has over 1 GHz of bandwidth at −10 dB return loss, and (iii) HFSS simulations show close correlation with actual measurement results; however, measured results could still be several dB lower or higher than predicted simulation results. For example, the gap between simulated and measured antenna gains is less than 1 dB for 26–28 GHz and 28.5–30 GHz frequencies, but almost 3 dB for 28–28.5 GHz frequency band. Full article
(This article belongs to the Special Issue Antenna Design and Its Applications)
Show Figures

Figure 1

Figure 1
<p>In an FD radio, SI is cancelled over multiple stages, including antenna, analog, and digital cancellation. Antenna cancellation refers to a plurality of techniques, including use of RF absorbers, reflectors, EBGs, or even additional antennas to reduce SI in the antenna domain.</p>
Full article ">Figure 2
<p><b>Top Left</b>: Zoomed-in 3D model of the unit antenna showing mechanical holes and connector. <b>Top Right</b>: Unit antenna in radiation box. <b>Bottom</b>: Stack-up with material property and layers. Bottom and second layers are used as GND.</p>
Full article ">Figure 3
<p>Frequency bandwidth and return loss measurement setup for the AUT. <b>Left</b>: Unit antenna on Printed Circuit Board (PCB) and its connector. The connector is attached to a 2.92 mm RF adapter, which is then connected to the VNA through a blue RF cable. <b>Right</b>: Unit antenna lab measurement setup. The Anritsu 2-port VNA is connected to the AUT via a blue RF cable.</p>
Full article ">Figure 4
<p><b>Top</b>: S-parameter plots (<math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> </mrow> <msub> <mi>S</mi> <mn>11</mn> </msub> <mrow> <mo>|</mo> </mrow> </mrow> </semantics></math>) showing simulated (red) and measured return loss (blue). <b>Bottom</b>: VSWR Plots. The measured −10 dB bandwidth is 1.2 GHz (from 27.6 GHz to 28.8 GHz).</p>
Full article ">Figure 5
<p>Far-field measurement setup in an anechoic chamber. <b>Left</b>: robotic arm holding a probe horn antenna. <b>Right</b>: Robotic arm holding the antenna under test (AUT) to determine the 3D radiation pattern.</p>
Full article ">Figure 6
<p>(<b>a</b>): Simulated 3D radiation pattern (dBi). (<b>b</b>): Measured 3D radiation pattern (dBi). (<b>c</b>): Simulated H-Plane (Co) and (Cross) polarization plots. (<b>d</b>): E-Plane (Co) and (Cross) polarization plots.</p>
Full article ">Figure 7
<p>Frequency vs. gain simulated (red) and measured (blue) plots showing measured peak gain of 4 dBi between 28 and 28.5 GHz.</p>
Full article ">Figure 8
<p><b>Left</b>: Multi-path interference due to patch antenna destructive interference of surface current waves and antenna radiated waves resulting from using solid GND plane as reference GND in patch antenna design. <b>Right</b>: Mushroom EBGs, as an alternative to the solid ground plane, mitigate surface current propagation and radiation, and improve the antenna performance.</p>
Full article ">Figure 9
<p>High Impedance Surface novel Stacked EBG (HIS-nSEBG) 3D model structure. (<b>a</b>): Four-layer stack-up showing top and second layers of the patch with a plated through-hole via. The diameter of the through hole via is 0.2 mm. Substrate thickness is 850 <math display="inline"><semantics> <mo>μ</mo> </semantics></math>m and the PCB material is RO435B Rogers laminate. (<b>b</b>): The 3D view of stacked HIS-nEBG connecting to the Bottom ground layer. (<b>c</b>): The dimension of top and second layer stacked EBG are specified. The dimensions were finalized after numerous HFSS simulations to provide a balance between antenna gain, isolation bandwidth, and port-to-port cancellation.</p>
Full article ">Figure 10
<p>Transmit and Receive antenna elements relative to HIS-nSEBG.</p>
Full article ">Figure 11
<p><b>Top Left</b>: HIS-nSEBG implementation in between Tx and Rx antennas. <b>Top Right</b>: Zoomed-in HIS-nSEBG showing top and second layer EBG patches. <b>Bottom Left</b>: HIS-nSEBG dimension of patches. <b>Bottom Right</b>: PCB stitching vias around EBG walls.</p>
Full article ">Figure 12
<p><b>Top</b>: The coupling between Tx and Rx ports/antennas without an EBG. <b>Bottom</b>: HIS-nSEBG creates a scattering path within the EBG structure, which reduces the mutual coupling.</p>
Full article ">Figure 13
<p>2-Port Anrithsu VNA lab measurement setup for gathering the return loss and isolation parameters for the antennas. The picture shows the fabricated antenna with integrated HIS-nSEBG.</p>
Full article ">Figure 14
<p>Simulated and measured SI Suppression plots with and without HIS-nSEBG structures. Simulated and measured data compare well across all frequencies with only a few dB difference. Tx-Rx coupling without HIS-nSEBG (due to over-the-air path loss) is about −30 dB. HIS-nSEBG provides an average of 25 dB additional SI reduction across the 27.5 GHz and 28.5 GHz frequency range of interest.</p>
Full article ">Figure 15
<p>A snapshot of the electric field distribution when the radio operates in FD mode with HIS-nSEBG (<b>bottom</b>) and without EBG (<b>top</b>).</p>
Full article ">
20 pages, 796 KiB  
Article
Dynamic Fault Tree Model of Civil Aircraft Avionics Network Transmission Failure Based on Optimized Extended Fuzzy Algorithm
by Zhaojun Gu, Yinuo Zhang and He Sui
Aerospace 2024, 11(8), 631; https://doi.org/10.3390/aerospace11080631 - 1 Aug 2024
Viewed by 1121
Abstract
The avionics network supports high-safety-level flight operations, with the analysis of transmission failures serving as a crucial means for its safety evaluation. Due to the time-dependent nature of the failure probability in avionics networks, traditional constant and unchangeable probability values can deviate from [...] Read more.
The avionics network supports high-safety-level flight operations, with the analysis of transmission failures serving as a crucial means for its safety evaluation. Due to the time-dependent nature of the failure probability in avionics networks, traditional constant and unchangeable probability values can deviate from the actual situation under specific conditions. This deviation may lead to inadequate responses to occasional events and potentially cause flight accidents. A Dynamic Fault Tree (DFT) model for civil aircraft avionics network transmission failures, based on an optimized extended fuzzy algorithm, is introduced in this paper. Initially focusing on event correlations, a DFT is established for the transmission failure of the Avionics Full Duplex Switched Ethernet (AFDX). Subsequently, considering the variations between events, triangular fuzzy processing is applied to the event failure rates based on relative confidence levels. Finally, by optimizing the weakest t-norm operator, the failure probability intervals are aggregated and the fuzzy scale is regulated. Experimental results demonstrate that, compared to the static-minimum t-norm and traditional weakest t-norm methods, the proposed approach enhances the accuracy of the fuzzy failure probability intervals by 66.15% and 40.59%, respectively. Concurrently, it maintains consistency in the ranking of event importance, highlighting the superior effectiveness of the proposed method in analyzing transmission failures in avionics networks. Full article
Show Figures

Figure 1

Figure 1
<p>Proposed analysis method process.</p>
Full article ">Figure 2
<p>Dynamic logic gates.</p>
Full article ">Figure 3
<p>A380 avionics network topology.</p>
Full article ">Figure 4
<p>AFDX data transmission failure DFT.</p>
Full article ">Figure 5
<p>Simplified FT for avionic network transmission failure.</p>
Full article ">Figure 6
<p>Lengths of fuzzy failure probability intervals for AFDX data transmission.</p>
Full article ">Figure 7
<p>Fuzzy failure probability interval of TOP.</p>
Full article ">
17 pages, 10211 KiB  
Article
Digital Self-Interference Cancellation for Full-Duplex Systems Based on CNN and GRU
by Jun Liu and Tian Ding
Electronics 2024, 13(15), 3041; https://doi.org/10.3390/electronics13153041 - 1 Aug 2024
Viewed by 1096
Abstract
Self-interference (SI) represents a bottleneck in the performance of full-duplex (FD) communication systems, necessitating robust offsetting techniques to unlock the potential of FD systems. Currently, deep learning has been leveraged within the communication domain to address specific challenges and enhance efficiency. Inspired by [...] Read more.
Self-interference (SI) represents a bottleneck in the performance of full-duplex (FD) communication systems, necessitating robust offsetting techniques to unlock the potential of FD systems. Currently, deep learning has been leveraged within the communication domain to address specific challenges and enhance efficiency. Inspired by this, this paper reviews the self-interference cancellation (SIC) process in the digital domain focusing on SIC capability. The paper introduces a model architecture that integrates CNN and gated recurrent unit (GRU), while also incorporating residual networks and self-attention mechanisms to enhance the identification and elimination of SI. This model is named CGRSA-Net. Firstly, CNN is employed to capture local signal features in the time–frequency domain. Subsequently, a ResNet module is introduced to mitigate the gradient vanishing problem. Concurrently, GRU is utilized to dynamically capture and retain both long- and short-term dependencies during the communication process. Lastly, by integrating the self-attention mechanism, attention weights are flexibly assigned when processing sequence data, thereby focusing on the most important parts of the input sequence. Experimental results demonstrate that the proposed CGRSA-Net model achieves a minimum of 28% improvement in nonlinear SIC capability compared to polynomial and existing neural network-based eliminator. Additionally, through ablation experiments, we demonstrate that the various modules utilized in this paper effectively learn signal features and further enhance SIC performance. Full article
Show Figures

Figure 1

Figure 1
<p>Overall flow chart of the article.</p>
Full article ">Figure 2
<p>Full-duplex system model.</p>
Full article ">Figure 3
<p>CNN model structure.</p>
Full article ">Figure 4
<p>Residual block.</p>
Full article ">Figure 5
<p>GRU structure.</p>
Full article ">Figure 6
<p>Self-attention structure.</p>
Full article ">Figure 7
<p>The proposed SIC model.</p>
Full article ">Figure 8
<p>PSD of the SI after applying cancellation schemes.</p>
Full article ">Figure 9
<p>Loss value curves.</p>
Full article ">Figure 10
<p>PSD of the SI after applying various cancellation schemes.</p>
Full article ">
Back to TopTop