Vis enkel innførsel

dc.contributor.authorLi, Zhidu
dc.contributor.authorJiang, Yuming
dc.contributor.authorGao, Yuehong
dc.contributor.authorSang, Lin
dc.contributor.authorYang, Dacheng
dc.date.accessioned2019-09-03T06:52:29Z
dc.date.available2019-09-03T06:52:29Z
dc.date.created2019-01-17T09:53:40Z
dc.date.issued2019
dc.identifier.citationIEEE Journal on Selected Areas in Communications. 2019, 37 (2), 283-297.nb_NO
dc.identifier.issn0733-8716
dc.identifier.urihttp://hdl.handle.net/11250/2612123
dc.description.abstractIn this paper, the buffer-constrained throughput performance of a multi-user wireless-powered communication (WPC) system is investigated, where energy harvesting follows a non-linear model. The investigation focuses on the buffer overflow performance of sending data in the downlink (DL) from the access point (AP) node to each user equipment (UE) node and that in the uplink from each UE node to the AP node, based on which the throughput performance on both directions when a buffer constraint is enforced is studied. Specifically, the buffer overflow probability at each node is analyzed, based on which the buffer-constrained throughput is studied. In addition, to ensure the throughput performance under the buffer constraint, the DL transmission power allocation policy and the required energy storage capacity at each UE are investigated. Also, the optimal channel time allocation policy is studied with the objective of maximizing the minimum buffer-constrained throughput guaranteed to each UE at the same time. To this aim, an optimization problem is first formulated and then a dichotomy-based time allocation algorithm combined with a one-dimensional search is proposed to solve this problem. The analysis and results, explicitly relating the throughput to the buffer constraint in addition to WPC characteristics, shed new light on the design and performance analysis of WPC systems.nb_NO
dc.language.isoengnb_NO
dc.publisherIEEEnb_NO
dc.titleOn Buffer-Constrained Throughput of a Wireless-Powered Communication Systemnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber283-297nb_NO
dc.source.volume37nb_NO
dc.source.journalIEEE Journal on Selected Areas in Communicationsnb_NO
dc.source.issue2nb_NO
dc.identifier.doihttp://dx.doi.org/10.1109/JSAC.2018.2872374
dc.identifier.cristin1658921
dc.description.localcode© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextpreprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel