UAV-assisted communications with RF energy harvesting: A comprehensive survey
Unmanned aerial vehicles (UAVs) have recently achieved sky-rocketed prominence in
assisting various wireless communication scenarios due to their implicit characteristics like …
assisting various wireless communication scenarios due to their implicit characteristics like …
Offloading decision and resource allocation in aerial computing: A comprehensive survey
Aerial computing can facilitate the successful execution of tasks, ensuring low latency for
Internet of things (IoT) devices. It gains greater significance and practicality by offering both …
Internet of things (IoT) devices. It gains greater significance and practicality by offering both …
Secrecy performance analysis and optimization for UAV-relay-enabled WPT and cooperative NOMA MEC in IoT networks
This paper investigates a system for unmanned aerial vehicle (UAV)-enabled wireless
power transfer (WPT) and non-orthogonal multiple access (NOMA) mobile edge computing …
power transfer (WPT) and non-orthogonal multiple access (NOMA) mobile edge computing …
Energy outage analysis of aerial UAV-enabled SWIPT deployments
TH Nguyen - IEEE Access, 2024 - ieeexplore.ieee.org
This work investigates the energy-outage performance of aerial unmanned aerial vehicles
(UAV)-enabled simultaneous wireless information and power transfer (SWIPT) deployments …
(UAV)-enabled simultaneous wireless information and power transfer (SWIPT) deployments …
Computational efficiency maximization for UAV-assisted MEC networks with energy harvesting in disaster scenarios
Recently, unmanned aerial vehicle (UAV)-assisted mobile-edge computing (MEC) networks
are considered to provide effective and efficient solutions for disaster management …
are considered to provide effective and efficient solutions for disaster management …
UAV-assisted mobile edge computing model for cognitive radio-based IoT networks
HM Almasaeid - Computer Communications, 2025 - Elsevier
The explosive growth in Internet of Things (IoT) in terms of number of applications and
deployed devices has created many challenges over the past decade. Among the most …
deployed devices has created many challenges over the past decade. Among the most …
Secrecy Offloading Analysis of NOMA-based UAVaided MEC in IoT Networks with Imperfect CSI and SIC.
Nonorthogonal multiple access (NOMA) increases spectrum efficacy by permitting multiple
devices to share link resources. It can be used to provide convenient offloading computing …
devices to share link resources. It can be used to provide convenient offloading computing …
Design of Controlled Radiation Pattern Antenna Using Bent Monopole Antenna Array for Anti-jamming Application
This paper proposes an air-ground anti-jamming controlled radiation pattern antenna
(CRPA) communication system, in which a bent monopole antenna with a simple structure is …
(CRPA) communication system, in which a bent monopole antenna with a simple structure is …
Computational Intelligence for Modeling and Optimization of RFEH and WPT Systems: A Comprehensive Survey: Computational Intelligence for RFEH and WPT …
Several practical engineering optimization problems are computationally demanding,
requiring a large amount of computer time, processing power, and memory. These …
requiring a large amount of computer time, processing power, and memory. These …
Computing Power and Battery Charging Management for Solar Energy Powered Edge Computing
The integration of energy harvesting capabilities into mobile edge computing (MEC) edge
servers enables their deployment beyond the reach of electrical grids, expanding MEC …
servers enables their deployment beyond the reach of electrical grids, expanding MEC …