Mobile edge computing (MEC) is envisioned as a new paradigm by integrating the mobile computing functionality into 5G wireless networks, aiming at empowering communication networks with low-latency services. In general, mobile devices have finite battery lifetime (e.g., machine-type devices) and the energy harvesting is advocated to provide perpetual energy supply for achieving sustainable operation, which is very important for facilitating sustainable computing in future applications. In this paper, we propose a wireless powered MEC network architecture that employs device-to-device (D2D) communications underlaying heterogeneous networks (HetNets) to enable the computational tasks offloading to resource-rich edge servers. A dynamic offloading decision is made to execute the computation tasks. Then, we focus on the energy-efficient offloading scheme, and joint offloading and user association scheme. From the illustrative results, we provide insights for the design of this new network architecture. Furthermore, several open research topics are discussed. INDEX TERMS Mobile edge computing, energy harvesting, device-to-device (D2D) communication, computation offloading.
Py in PDS effectively protected neutrophils from HG-induced inhibition of O2- production, even at a physiological pH. The Py cytoprotection may be associated with the preservation of carbohydrate metabolic pathways in addition to its alkalization.
In this paper, we investigate the physical-layer security in an energy-harvesting (EH) multiuser network with the help of a friendly jammer (J), where multiple eavesdroppers are considered to tap the information transmission from users (Us) to base station (BS). In this system, a power beacon (PB) transmits radio frequency (RF) signals to Us for charging. In order to enhance the security of wireless transmission, we propose non-energy-aware multiuser scheduling (NEAMUS) scheme and energy-aware multiuser scheduling (EAMUS) scheme. For the purpose of comparison, we introduce conventional round robin multiuser scheduling (CRRMUS) scheme. The closed-form outage probability (OP) and intercept probability (IP) expressions of NEAMUS, EAMUS, and CRRMUS schemes are derived over Rayleigh fading channels. Additionally, we analyze the security-reliability tradeoff (SRT) of NEAMUS, EAMUS, and CRRMUS schemes in terms of OP and IP. Numerical results show that the proposed EAMUS scheme is superior to the CRRMUS scheme and NEAMUS scheme in terms of SRT, demonstrating the advantage of the proposed EAMUS scheme in improving the physical-layer security and reliability. Moreover, SRT performance of NEAMUS and EAMUS schemes can also be improved by increasing the number of users.
In this paper, the secrecy performance in a MIMO cognitive radio (CR) relay network with energy harvesting (EH) and transmit antenna selection/maximal ratio combining (TAS/MRC) is invstigated, where the DF relaying protocol and multiple colluding passive eavesdroppers are considered. To improve the security of wireless transmission, two antenna selection schemes are proposed, namely, the optimal transmit antenna selection (OTAS) scheme and suboptimal transmit antenna selection (STAS) scheme. For the purpose of comparison, the space‐time transmission (STT) scheme is introduced as a baseline. The exact and asymptotic closed‐form secrecy outage probability (SOP) expressions for OTAS, STAS and STT schemes are derived over Rayleigh fading channels. An extension of the TAS framework to an artificial noise (AN) aided MIMO network is further presented and an AN aided transmit antenna selection (AN‐TAS) scheme is proposed, in which the unselected antennas at R are used to emit AN for interfering with Es. Numerical results show that the OTAS and STAS schemes perform better than STT scheme in terms of SOP. Meanwhile, the SOP of AN‐TAS scheme is much smaller than that of OTAS, STAS and STT schemes in the high SNR region, indicating the benefit of applying AN in MIMO network.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.