The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
2020
DOI: 10.11591/ijece.v10i1.pp1085-1091
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid protocol for wireless EH network over weibull fading channel: performance analysis

Abstract: In this paper, the hybrid TSR-PSR protocol for wireless energy harvesting (EH) relaying network over the Weibull fading channel is investigated. The system network is working in half-duplex (HD) mode. For evaluating the system performance, the closed-form and integral-form expressions of the outage probability (OP) are investigated and derived. After that, numerical results convinced that our derived analytical results are the same with the simulation results by using Monte Carlo simulation. This paper provide… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…These are local networks, located between the internal and external networks of an organization that allows implementing security policies against computer attacks. Its main advantage is that the DMZ network, allows a direct connection from the internal and external network, while from the DMZ only communications to the external network are allowed, that is, that the local computers (hosts) in the DMZ cannot connect to the internal network, allowing the hosts in the DMZ to provide services to the external network, while protecting the internal network in case intruders compromise the security of the hosts in the DMZ zone [22]. The main features of a DMZ network are: -Traffic from the external network to the DMZ is authorized.…”
Section: Theoretical Frameworkmentioning
confidence: 99%
“…These are local networks, located between the internal and external networks of an organization that allows implementing security policies against computer attacks. Its main advantage is that the DMZ network, allows a direct connection from the internal and external network, while from the DMZ only communications to the external network are allowed, that is, that the local computers (hosts) in the DMZ cannot connect to the internal network, allowing the hosts in the DMZ to provide services to the external network, while protecting the internal network in case intruders compromise the security of the hosts in the DMZ zone [22]. The main features of a DMZ network are: -Traffic from the external network to the DMZ is authorized.…”
Section: Theoretical Frameworkmentioning
confidence: 99%