This document studies the outage performance of two secondary destinations in a cognitive radio non-orthogonal multiple access (CR-NOMA) network. It presents a system model of a downlink dual-hop CR-NOMA network consisting of a primary destination, secondary source, relay, and two secondary destinations. It derives the exact outage probability expressions for the secondary users by obtaining the signal-to-interference-plus noise ratio and signal-to-noise ratio for each transmission. The results show that the performance gap between the two secondary users can be obtained due to different power allocation factors assigned to each user.
Implement of multiple access technique by wireless power transfer and relayin...journalBEEI
ย
In this paper, we investigate non-orthogonal multiple access (NOMA) network relying on wireless power transfer to prolong lifetime. The base station (BS) sends common signals to the relay with two functions (energy harvesting (EH) and signal processing) to further serve two NOMA users in downlink. Performance gap exists since different power allocation factor assigned from power splitting protocol adopted at the relay and such relay employs both amplify-and-forward (AF) and decode-and-forward schemes. To provide performance metrics, we prove formulas of the outage probability which is a function of transmit signal to noise ratio. Simulation results indicate specific parameters to adjust system performance of two user in the considered EH-NOMA system. This finding is important recommendation to design EH-NOMA which shows particular outage performance at required target rates.
Study on transmission over Nakagami-m fading channel for multiple access sche...TELKOMNIKA JOURNAL
ย
In this paper, a downlink performance in non-orthogonal multiple access (NOMA) system is considered. With regard to different priority for two NOMA users, we exploit the closed-form expressions of outage probability over wireless fading channel following Nakagami-m fading. The fixed power allocation factor scheme is examined to reduce the complexity in computation regarding performance analysis. In our analysis, perfect successive interference cancellation (SIC) is applied in order to achieve perfect signal decoding operation. Simulation results show that the considered NOMA downlink scheme is affected by transmit SNR, power allocation factors, fading parameters.
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...TELKOMNIKA JOURNAL
ย
In this study, we deploy design and performance analysis in new system model using a relaying
model, energy harvesting, and non-orthogonal multi-access (NOMA) network. It is called such topology as
wireless powered NOMA relaying (WPNR). In the proposed model, NOMA will be investigated in two
cases including single successive interference cancellation (SIC) and dual SIC. Moreover,
the simultaneous wireless information and power transfer (SWIPT) technology can be employed to feed
energy to relays who intend to serve far NOMA users. In particular, exact outage probability expressions
are provided to performance evaluation. The results from the simulations are used to demonstrate
the outage performance of the proposed model in comparison with the current models and to verify correct
of derived expressions.
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksTELKOMNIKA JOURNAL
ย
1) The document compares the secrecy probability performance of amplify-and-forward non-orthogonal multiple access (AF-NOMA) networks and amplify-and-forward orthogonal multiple access (AF-OMA) networks in the presence of an eavesdropper.
2) It derives an upper bound expression for the strictly positive secrecy capacity (SPSC) of the AF-NOMA network, which represents the probability that the instantaneous secrecy rates are positive.
3) The analysis shows that the SPSC of NOMA is significantly lower than OMA due to the channel characterization of NOMA, but it can be improved by optimizing the power allocation coefficients.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMATELKOMNIKA JOURNAL
ย
In this paper, new radio access scheme that combines Amplify-and-Forward (AF) relaying protocol and non-orthogonal multiple access (NOMA) system is introduced. In particular, different scenarios for fixed power allocation scheme is investigated. In addition, the outage probability of both weak and strong user is derived and provided in closed-form expressions. Such outage is investigated in high SNR scenario and comparison performance between these NOMA scenarios is introduced. Numerical simulations are offered to clarify the outage performance of the considered scheme if varying several parameters in the existing schemes to verify the derived formulas.
A new look on CSI imperfection in downlink NOMA systemsjournalBEEI
ย
- The document analyzes the performance of downlink non-orthogonal multiple access (NOMA) systems under imperfect channel state information (CSI) and Nakagami-m fading.
- It derives closed-form expressions for the outage probability of two users in such NOMA systems considering the joint impact of imperfect CSI and Nakagami-m fading.
- Monte Carlo simulations are conducted to verify the accuracy of the analytical outage probability expressions derived for the two users under the system and channel models considered.
Outage performance users located outside D2D coverage area in downlink cellul...journalBEEI
ย
Device-to-device (D2D) communication has been proposed to employ the proximity between two devices to enhance the overall spectrum utilization of a crowded cellular network. With the help of geometric probability tools, this framework considers the performance of cellular users under spatial separation with the D2D pair is investigated. The measurement results and analytical expression of outage probability show that the proposed frameworks improve the outage performance at a high signal-tonoise ratio (SNR) at the base station. Results also interpret that the distances between nodes in the D2D-assisted network make slight impacts on the performance of the cellular user.
Implement of multiple access technique by wireless power transfer and relayin...journalBEEI
ย
In this paper, we investigate non-orthogonal multiple access (NOMA) network relying on wireless power transfer to prolong lifetime. The base station (BS) sends common signals to the relay with two functions (energy harvesting (EH) and signal processing) to further serve two NOMA users in downlink. Performance gap exists since different power allocation factor assigned from power splitting protocol adopted at the relay and such relay employs both amplify-and-forward (AF) and decode-and-forward schemes. To provide performance metrics, we prove formulas of the outage probability which is a function of transmit signal to noise ratio. Simulation results indicate specific parameters to adjust system performance of two user in the considered EH-NOMA system. This finding is important recommendation to design EH-NOMA which shows particular outage performance at required target rates.
Study on transmission over Nakagami-m fading channel for multiple access sche...TELKOMNIKA JOURNAL
ย
In this paper, a downlink performance in non-orthogonal multiple access (NOMA) system is considered. With regard to different priority for two NOMA users, we exploit the closed-form expressions of outage probability over wireless fading channel following Nakagami-m fading. The fixed power allocation factor scheme is examined to reduce the complexity in computation regarding performance analysis. In our analysis, perfect successive interference cancellation (SIC) is applied in order to achieve perfect signal decoding operation. Simulation results show that the considered NOMA downlink scheme is affected by transmit SNR, power allocation factors, fading parameters.
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...TELKOMNIKA JOURNAL
ย
In this study, we deploy design and performance analysis in new system model using a relaying
model, energy harvesting, and non-orthogonal multi-access (NOMA) network. It is called such topology as
wireless powered NOMA relaying (WPNR). In the proposed model, NOMA will be investigated in two
cases including single successive interference cancellation (SIC) and dual SIC. Moreover,
the simultaneous wireless information and power transfer (SWIPT) technology can be employed to feed
energy to relays who intend to serve far NOMA users. In particular, exact outage probability expressions
are provided to performance evaluation. The results from the simulations are used to demonstrate
the outage performance of the proposed model in comparison with the current models and to verify correct
of derived expressions.
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksTELKOMNIKA JOURNAL
ย
1) The document compares the secrecy probability performance of amplify-and-forward non-orthogonal multiple access (AF-NOMA) networks and amplify-and-forward orthogonal multiple access (AF-OMA) networks in the presence of an eavesdropper.
2) It derives an upper bound expression for the strictly positive secrecy capacity (SPSC) of the AF-NOMA network, which represents the probability that the instantaneous secrecy rates are positive.
3) The analysis shows that the SPSC of NOMA is significantly lower than OMA due to the channel characterization of NOMA, but it can be improved by optimizing the power allocation coefficients.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMATELKOMNIKA JOURNAL
ย
In this paper, new radio access scheme that combines Amplify-and-Forward (AF) relaying protocol and non-orthogonal multiple access (NOMA) system is introduced. In particular, different scenarios for fixed power allocation scheme is investigated. In addition, the outage probability of both weak and strong user is derived and provided in closed-form expressions. Such outage is investigated in high SNR scenario and comparison performance between these NOMA scenarios is introduced. Numerical simulations are offered to clarify the outage performance of the considered scheme if varying several parameters in the existing schemes to verify the derived formulas.
A new look on CSI imperfection in downlink NOMA systemsjournalBEEI
ย
- The document analyzes the performance of downlink non-orthogonal multiple access (NOMA) systems under imperfect channel state information (CSI) and Nakagami-m fading.
- It derives closed-form expressions for the outage probability of two users in such NOMA systems considering the joint impact of imperfect CSI and Nakagami-m fading.
- Monte Carlo simulations are conducted to verify the accuracy of the analytical outage probability expressions derived for the two users under the system and channel models considered.
Outage performance users located outside D2D coverage area in downlink cellul...journalBEEI
ย
Device-to-device (D2D) communication has been proposed to employ the proximity between two devices to enhance the overall spectrum utilization of a crowded cellular network. With the help of geometric probability tools, this framework considers the performance of cellular users under spatial separation with the D2D pair is investigated. The measurement results and analytical expression of outage probability show that the proposed frameworks improve the outage performance at a high signal-tonoise ratio (SNR) at the base station. Results also interpret that the distances between nodes in the D2D-assisted network make slight impacts on the performance of the cellular user.
Outage performance of downlink NOMA-aided small cell network with wireless po...journalBEEI
ย
This article considers the outage performance of the downlink transmission for a small cell network in a heterogeneous network. Due to mobility and distribution of users, it is necessary to study massive connections and high energy efficiency for such kind of systems. To be an enabler of energy harvesting, a power beacon is helpful to support the base station to send signals to distant users, and wireless power transfer (WPT) is exploited to guarantee the data packets transmission from the power beacon to the base station. To provide massive connections, we propose a novel non-orthogonal multiple access (NOMA) technique combined with WPT to enhance outage performance and latency reduction. Furthermore, we derive outage probability (OP) to characterize the system performance. Simulation results are verified to match well between theoretical and analytical methods, and main parameters are determined to understand how they affect the proposed scheme.
Circularly polarized antenna array based on hybrid couplers for 5G devicesjournalBEEI
ย
This paper depicts a wideband circularly polarized (CP) antenna for 5G devices. The antenna array has a 3D structure including four simple printed dipole elements with directional radiations, high gain, and high efficiency. It achieves a CP by using the sequential rotation (SR) feeding based on 90ยฐ-3dB hybrid couplers in the proposed feeding network. The antenna array bandwidth is wide, 26.7%, with an operating frequency band from 3.35 GHz to 4.35 GHz. The antenna achieves a high peak gain of 10.73 dBi and high efficiency of 93.75%. Besides, the antenna gain is stable over the operating bandwidth (BW). At the centre operating frequency of 3.75 GHz, the angle of circular polarization is 51ยฐ. The antenna is designed and fabricated on the Rogers 4003 C substrate. The measured S11 is well matching with the simulation results. With the above characteristics, the proposed antenna can be a suitable candidate for 5G devices.
Estimating cellphone signal intensity & identifying radiation hotspot are...eSAT Journals
ย
Abstract The increased uses of mobile phones have raised public interest in possible health issues associated with exposure to electromagnetic energy. For the speedy transmission and avoiding the construction of more towers, the single tower can be shared by multiple network operators. The simultaneous exposure to multiple frequency fields, the sum of all the radiation must be taken into consideration so the radiation intensity level exceeds by several times than the prescribed guideline. Hence, the public is being exposed to continuous, low intensity radiations from these towers. Present Survey has been designed to identify signal strength among the people dwelling near the base station. Signal Strength predicted by integration of NDVI methodology is taken into account for factors like trees, trunks, leaves, branches, their density and their heights relative to the antenna heights and also it has been calculated by both theoretical and practical. In this regard the present study, practical field investigations of existing towers have been done by using SCEPTOR (Mobile GIS/GPS receiver). These GPS data fed to GIS for creating a new layer along with DEM file and satellite image for creating virtual model.3D city model has been performed for the study area. Finally the radiation hotspot area has been identified by using viewshed analysis. Keywords: RF Coverage, Signal Strength, GIS, Remote Sensing, GPS, and Antenna
Performance analysis of beam divergence propagation through rainwater and sno...journalBEEI
ย
In the present work the future communication requirements need to fulfill with high data rate, FSO (free space optic) with it is tremendous potential is the solution. This research observed the effectiveness analysis of FSO systems by modifying one of the most important FSO parameters beam divergence, under the most affected weather attenuating condition Rainwater and snow pack. The simulation is obtained and analyzed under single channels CSRZ-FSO (carrier-suppressed return-to-zero/free space optical) systems having capacity of 40 Gbps between two transceivers with variable distance. The connection is presently under 5 meteorological turbulences (light rain, medium rain, wet snow, heavy rain and dry snow). The results show the heavy rain and dry snow have a very high attenuation carried out in terms of Q-factor. this result led us to conclude that small divergence offers significant performance improvement for FSO link and this performance decrease every time the beam divergence increase, Therefore, to build inexpensive and reliable transmission media, we go with new method that still in the experiment area called hybrid RF/FSO (radio frequency/free space optical) that compatible with atmospherically status.
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Journals
ย
Abstract The design of Multi Carrier Direct Sequence Code Division Multiple Access (MC-DS-CDMA) structure which generalizes serial and parallel concatenated code is investigated to this project. This model is ideal for designing various codes in the performance of both error floor and water floor region. We propose a concatenated code for transmitter block which is used for multi carrier direct sequence CDMA technique. Simulation results of MC-DS-CDMA uplink system using Cadence software shows the various parameters such as memory, Execution time and number of transient steps required for the Execution of MC-DS-CDMA uplink system was estimated and also power consumed was determined for each block in the transmitter. An improved concatenated code model is used for uplink mobile communication. Further system performance improvements can be obtained by concatenating inner code and outer code and the results of computer simulations demonstrate that the performance of the concatenated code was investigated. Keywords: Code Division Multiple Access, Concatenated code, inner code, outer code, interleaving and power analysis.
1) The document presents a simulation of an MC-CDMA system using MSK modulation over AWGN and Rayleigh channels.
2) It shows that the BER performance of the MC-CDMA system is affected by both the number of users and the channel type, with higher numbers of users and Rayleigh fading increasing the BER.
3) The results also show that for both channel types, the MC-CDMA system has better BER performance when using MSK modulation compared to BPSK modulation.
This document discusses techniques for determining the pinpoint location of mobile devices in Global System for Mobile Communication (GSM) networks. It begins with an introduction to the history and development of GSM standards. It then describes several outdoor propagation models that are commonly used to predict signal strength at different locations, including the Longley-Rice model, Durkin's model, and Okumura's model. These models take into account factors like terrain profile, buildings, foliage and antenna heights to estimate path loss between the base station and mobile.
Design and analysis of microstrip antenna with zig-zag feeder for wireless co...journalBEEI
ย
This document describes the design and analysis of a microstrip antenna with a zig-zag feeder for wireless communication applications. The proposed antenna is designed to have a wide bandwidth of 2-14 GHz. It consists of a zig-zag microstrip feedline connected to a tuning stub printed on one side of a substrate. On the other side of the substrate is a ground plane with zig-zag slots. Parametric analysis was performed to optimize the dimensions for wide bandwidth and acceptable gain between 7.448-5.928 dB. The zig-zag feedline and tuning stub with elliptical slots help improve the impedance matching for wide bandwidth operation suitable for UWB applications. Simulation results for radiation patterns, current distribution, and
On limits of Wireless Communications in a Fading Environment: a General Param...ijeei-iaes
ย
The reliable services along with high throughput can be achieved by using wireless communication systems. These systems also provides a wide coverage because of their features, no doubt MIMO Communication System [1] is one among them. Features provided by these systems ensure the improved system coverage and increased data transmission rate by considering multiple numbers of transmitter and receiver antennas. In this article, the concept of equalization has been considered and finally the performance of the MIMO Systems in Rician flat fading [5] channel is compared with the Rayleigh flat fading channel. It has also been observed that the performance of these Systems in Rician Flat Fading Channel is the best as compare to the Rayleigh Flat Fading Channel [10]. It has been concluded that the successive interference methods provide better performance as compare to others, but their complexity is high. Simulation results shows that ML provides the better performance in comparison to other equalizers but Sphere decoder provides the best performance.
The impact of intermodulation interference in superimposed 2 g and 3gPrecious Kamoto
ย
This document discusses intermodulation interference between 2G and 3G wireless networks operating in the same geographic areas. It investigates how signals from GSM base stations can cause intermodulation interference that degrades the quality of service of UMTS networks. The document proposes a new frequency planning strategy to optimize the QoS of 3G networks in an environment where 2G and 3G systems coexist and can interfere with each other.
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELSIJCNCJournal
ย
This document analyzes the bit error rate (BER) of two-user power-domain non-orthogonal multiple access (NOMA) systems using successive interference cancellation receivers over Rayleigh fading channels. It derives closed-form expressions for the BER in single-input single-output and multiple-input multiple-output NOMA systems. The analysis considers two categories of multiuser superposition transmission and verifies the analytical results through Monte Carlo simulation.
This document proposes a physical-layer network coding (PNC) scheme to improve throughput in wireless networks. PNC takes advantage of the broadcast nature of wireless transmissions by allowing signals from multiple nodes to be combined at the physical layer through modulation and demodulation. It demonstrates PNC for a three-node wireless linear network. With PNC, the three nodes can exchange information in two time slots, improving throughput by 100% over traditional scheduling and 50% over straightforward network coding. PNC mapping provides a way to perform network coding operations on electromagnetic signals directly at the physical layer by mapping their combination to binary additions.
This document analyzes and compares OFDMA and CDMA/WCDMA systems. It first discusses channel estimation techniques for OFDMA and CDMA, including minimum mean square error (MMSE) and least squares estimation. It then analyzes properties of OFDMA systems, including the effect of total power and cluster size on signal-to-interference plus noise ratio and signal-to-interference ratio. Finally, it compares the downlink capacities of OFDMA and WCDMA systems and proposes a new multiple access technique called OWCFDMA that combines advantages of both. The overall goal is to improve wireless communication system performance by integrating OFDMA and CDMA/WCDMA techniques.
Equalization & Channel Estimation of Block & Comb Type CodesAM Publications
ย
Multi-carrier code division multiple access is an attractive choice for high speed wireless communication as it mitigates
the problem of inter symbol interference and also exploits frequency diversity. The work described in this paper is my effort in this
direction. In this paper working of Transmitter and Receiver model of MCCDMA system is presented. We evaluated interference
and bit error rate for multicarrier code division multiple access wireless communication system. In this thesis my concern is find
out the effect of interference in MC-CDMA system. We find out the effect of number of users and signal power on different
parameters for MC-CDMA system. Simulations are given to support the system and receiver design. All the simulation is carried out on MATLAB tool.
Effect on Channel Capacity of Multi-User MIMO System in Crowded AreaIJEEE
ย
1) The document analyzes the effect of multi-user MIMO (MU-MIMO) systems on channel capacity in crowded urban areas compared to single-user MIMO (SU-MIMO) systems.
2) It finds that MU-MIMO can achieve higher channel capacity than SU-MIMO in urban environments due to lower spatial correlation between users, unlike assumptions of independent channels in MIMO transmission.
3) The improvement of MU-MIMO capacity over SU-MIMO increases with path visibility, with MU-MIMO showing better performance when path visibility is over 13%.
Wireless communication now has been focus to increase data rate and high performance. The
multi carrier on multi-hop communication system using relay's diversity technique which is
supported by a reliable coding is a system that may give high performance.
This research is developing a model of multi carrier CDMA on multi hop communication
system with diversity technique which is using Alamouti codes in Rayleigh fading channel. By
Alamouti research, Space Time Block Code (STBC) for MIMO system can perform high quality
signal at the receiver in the Rayleigh fading channel and the noisy system. In this research,
MIMO by STBC is applied to single antenna system (Distributed-STBC/DSTBC) with multi
carrier CDMA on multi hop wireless communication system (relay diversity) which is able to
reduce the complexity of the system but the system performance even can be maintained and
improved.
MC CDMA on multi hop wireless communication system with 2 hops is performing much better
than Single Input Single Output (SISO) system (1 hop system). Power needed for 1 hop system to
have the same quality as 2 hops system to reach BER 10-3 is 12 dB. And multi hop system needs
orthogonal symbol to send from relay than original symbol to reach better performance. 12.5
dB power up is needed for multi hop system which sent same symbol as transmitter than relay
system which sent orthogonal symbol.
This document compares several propagation path loss models - Okumura, Hata, ECC 33, Cost-231, and SUI - by estimating path losses and signal strengths at 950 MHz in urban, suburban, and rural areas. Path losses are estimated using each model and compared to measured practical data from those environments. The results show that the Hata model most closely matches the practical data across all three environments. Therefore, the Hata model is concluded to be the most suitable for predicting signal strength in urban, suburban, and rural areas.
In this research paper, substrate integrated waveguide (SIW) was proposed as a technique by
realizing bilateral edge walls to produce a compact 5G beam-steering antenna at 24 GHz. The beam
forming network is produced using SIW directional coupler perform as 2ร2 Butler Matrix (BM) fed with SIW
slotted waveguide antenna array. The output signal is steered from -29 degrees and +29 degrees when
the signal is fed to the respective input ports. If one of the input ports is fed, the signal is evenly distributed
between the adjacent output ports with 90 degree constant phase shift. The compact size of directional
coupler was designed by longitude slots on the surface of SIW substrate with bandwith of 16.85% at the
operating frequency. The proposed antenna produce gain of 6.34 dB at operating frequency and the
promising outcome of the beam steering make proposed design suitable for 5G communications especially
with tracking capabilities.
This document provides an overview of CDMA (Code Division Multiple Access), including its access schemes, coding, codes, spreading process, power control, handover, multipath and rake receivers. It describes how CDMA uses unique spreading codes to spread data before transmission. Receivers use correlators to despread the signal and filters to isolate the desired signal from interference. Power control is important to limit interference in this interference-limited system. Soft handovers allow connections between multiple cells. Multipath signals are combined using rake receivers to strengthen the signal.
Secure outage probability of cognitive radio network relying non-orthogonal m...journalBEEI
ย
This paper studies the secondary network relying relay selection to transmit signal from the secondary source (base station) to two destinations. Especially, two destinations are required non-orthogonal multiple access (NOMA) scheme and it benefits to implementation of the Internet of Things (IoT) systems. However, eavesdropper over-hears signal related link from selected relay to destination. This paper measure secure performance via metric, namely secure outage probability (SOP). In particular, signal to noise ratio (SNR) criterion is used to evalute SOP to provide reliable transmission to the terminal node. Main results indicates that the considered scheme provides performance gap among two signals at destination. The exactness of derived expressions is confirmed via numerical simulation.
Security performance analysis for power domain NOMA employing in cognitive ra...journalBEEI
ย
The power domain non-orthogonal multiple access (NOMA) technique introduces one of the fundamental characteristics and it exhibits the possibility of users to decode the messages of the other paired users on the same resources. In cognitive radio inspired NOMA (CR-NOMA), the base station (BS) has to serve untrusted users or users with different security clearance. This phenomenon raises a security threat particularly in such CR-NOMA. This paper develops a tractable analysis framework to evaluate the security performance of cooperative non-orthogonal multiple access (NOMA) in cognitive networks, where relay is able to serve two far NOMA users in the presence of external eavesdropper. In particular, we study the secrecy outage probability in a two-user NOMA system. This situation happens in practical the BS is pairing a legitimate user with another untrusted user. Main reason is that the non-uniform distribution in terms of trusted and untrusted users in the cell. By performing numerical results demonstrate the performance improvements of the proposed NOMA scheme in comparison to that of several situations in terms of different parameters. Furthermore, the security performance of NOMA is shown to verify the derived expressions.
Tractable computation in outage performance analysis of relay selection NOMATELKOMNIKA JOURNAL
ย
In recent years, using full-duplex (FD) transmission model provides enhanced bandwidth efficiency and improved performance for non-orthogonal multiple access (NOMA) system. However, lack of papers have investigated FD relay together with relay selection issue to improve performance of NOMA system. The problems in power allocation for two NOMA users satisfying fairness as well as relay selection strategy are studied in this paper. By considering the outage performance of proposed scheme with its vital result, general NOMA wireless networks can be developed for future networks due to its improved performance. Simulation results show that the relaying selection scheme can achieve a significant performance improvement by increasing required quantity of relay.
Outage performance of downlink NOMA-aided small cell network with wireless po...journalBEEI
ย
This article considers the outage performance of the downlink transmission for a small cell network in a heterogeneous network. Due to mobility and distribution of users, it is necessary to study massive connections and high energy efficiency for such kind of systems. To be an enabler of energy harvesting, a power beacon is helpful to support the base station to send signals to distant users, and wireless power transfer (WPT) is exploited to guarantee the data packets transmission from the power beacon to the base station. To provide massive connections, we propose a novel non-orthogonal multiple access (NOMA) technique combined with WPT to enhance outage performance and latency reduction. Furthermore, we derive outage probability (OP) to characterize the system performance. Simulation results are verified to match well between theoretical and analytical methods, and main parameters are determined to understand how they affect the proposed scheme.
Circularly polarized antenna array based on hybrid couplers for 5G devicesjournalBEEI
ย
This paper depicts a wideband circularly polarized (CP) antenna for 5G devices. The antenna array has a 3D structure including four simple printed dipole elements with directional radiations, high gain, and high efficiency. It achieves a CP by using the sequential rotation (SR) feeding based on 90ยฐ-3dB hybrid couplers in the proposed feeding network. The antenna array bandwidth is wide, 26.7%, with an operating frequency band from 3.35 GHz to 4.35 GHz. The antenna achieves a high peak gain of 10.73 dBi and high efficiency of 93.75%. Besides, the antenna gain is stable over the operating bandwidth (BW). At the centre operating frequency of 3.75 GHz, the angle of circular polarization is 51ยฐ. The antenna is designed and fabricated on the Rogers 4003 C substrate. The measured S11 is well matching with the simulation results. With the above characteristics, the proposed antenna can be a suitable candidate for 5G devices.
Estimating cellphone signal intensity & identifying radiation hotspot are...eSAT Journals
ย
Abstract The increased uses of mobile phones have raised public interest in possible health issues associated with exposure to electromagnetic energy. For the speedy transmission and avoiding the construction of more towers, the single tower can be shared by multiple network operators. The simultaneous exposure to multiple frequency fields, the sum of all the radiation must be taken into consideration so the radiation intensity level exceeds by several times than the prescribed guideline. Hence, the public is being exposed to continuous, low intensity radiations from these towers. Present Survey has been designed to identify signal strength among the people dwelling near the base station. Signal Strength predicted by integration of NDVI methodology is taken into account for factors like trees, trunks, leaves, branches, their density and their heights relative to the antenna heights and also it has been calculated by both theoretical and practical. In this regard the present study, practical field investigations of existing towers have been done by using SCEPTOR (Mobile GIS/GPS receiver). These GPS data fed to GIS for creating a new layer along with DEM file and satellite image for creating virtual model.3D city model has been performed for the study area. Finally the radiation hotspot area has been identified by using viewshed analysis. Keywords: RF Coverage, Signal Strength, GIS, Remote Sensing, GPS, and Antenna
Performance analysis of beam divergence propagation through rainwater and sno...journalBEEI
ย
In the present work the future communication requirements need to fulfill with high data rate, FSO (free space optic) with it is tremendous potential is the solution. This research observed the effectiveness analysis of FSO systems by modifying one of the most important FSO parameters beam divergence, under the most affected weather attenuating condition Rainwater and snow pack. The simulation is obtained and analyzed under single channels CSRZ-FSO (carrier-suppressed return-to-zero/free space optical) systems having capacity of 40 Gbps between two transceivers with variable distance. The connection is presently under 5 meteorological turbulences (light rain, medium rain, wet snow, heavy rain and dry snow). The results show the heavy rain and dry snow have a very high attenuation carried out in terms of Q-factor. this result led us to conclude that small divergence offers significant performance improvement for FSO link and this performance decrease every time the beam divergence increase, Therefore, to build inexpensive and reliable transmission media, we go with new method that still in the experiment area called hybrid RF/FSO (radio frequency/free space optical) that compatible with atmospherically status.
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Journals
ย
Abstract The design of Multi Carrier Direct Sequence Code Division Multiple Access (MC-DS-CDMA) structure which generalizes serial and parallel concatenated code is investigated to this project. This model is ideal for designing various codes in the performance of both error floor and water floor region. We propose a concatenated code for transmitter block which is used for multi carrier direct sequence CDMA technique. Simulation results of MC-DS-CDMA uplink system using Cadence software shows the various parameters such as memory, Execution time and number of transient steps required for the Execution of MC-DS-CDMA uplink system was estimated and also power consumed was determined for each block in the transmitter. An improved concatenated code model is used for uplink mobile communication. Further system performance improvements can be obtained by concatenating inner code and outer code and the results of computer simulations demonstrate that the performance of the concatenated code was investigated. Keywords: Code Division Multiple Access, Concatenated code, inner code, outer code, interleaving and power analysis.
1) The document presents a simulation of an MC-CDMA system using MSK modulation over AWGN and Rayleigh channels.
2) It shows that the BER performance of the MC-CDMA system is affected by both the number of users and the channel type, with higher numbers of users and Rayleigh fading increasing the BER.
3) The results also show that for both channel types, the MC-CDMA system has better BER performance when using MSK modulation compared to BPSK modulation.
This document discusses techniques for determining the pinpoint location of mobile devices in Global System for Mobile Communication (GSM) networks. It begins with an introduction to the history and development of GSM standards. It then describes several outdoor propagation models that are commonly used to predict signal strength at different locations, including the Longley-Rice model, Durkin's model, and Okumura's model. These models take into account factors like terrain profile, buildings, foliage and antenna heights to estimate path loss between the base station and mobile.
Design and analysis of microstrip antenna with zig-zag feeder for wireless co...journalBEEI
ย
This document describes the design and analysis of a microstrip antenna with a zig-zag feeder for wireless communication applications. The proposed antenna is designed to have a wide bandwidth of 2-14 GHz. It consists of a zig-zag microstrip feedline connected to a tuning stub printed on one side of a substrate. On the other side of the substrate is a ground plane with zig-zag slots. Parametric analysis was performed to optimize the dimensions for wide bandwidth and acceptable gain between 7.448-5.928 dB. The zig-zag feedline and tuning stub with elliptical slots help improve the impedance matching for wide bandwidth operation suitable for UWB applications. Simulation results for radiation patterns, current distribution, and
On limits of Wireless Communications in a Fading Environment: a General Param...ijeei-iaes
ย
The reliable services along with high throughput can be achieved by using wireless communication systems. These systems also provides a wide coverage because of their features, no doubt MIMO Communication System [1] is one among them. Features provided by these systems ensure the improved system coverage and increased data transmission rate by considering multiple numbers of transmitter and receiver antennas. In this article, the concept of equalization has been considered and finally the performance of the MIMO Systems in Rician flat fading [5] channel is compared with the Rayleigh flat fading channel. It has also been observed that the performance of these Systems in Rician Flat Fading Channel is the best as compare to the Rayleigh Flat Fading Channel [10]. It has been concluded that the successive interference methods provide better performance as compare to others, but their complexity is high. Simulation results shows that ML provides the better performance in comparison to other equalizers but Sphere decoder provides the best performance.
The impact of intermodulation interference in superimposed 2 g and 3gPrecious Kamoto
ย
This document discusses intermodulation interference between 2G and 3G wireless networks operating in the same geographic areas. It investigates how signals from GSM base stations can cause intermodulation interference that degrades the quality of service of UMTS networks. The document proposes a new frequency planning strategy to optimize the QoS of 3G networks in an environment where 2G and 3G systems coexist and can interfere with each other.
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELSIJCNCJournal
ย
This document analyzes the bit error rate (BER) of two-user power-domain non-orthogonal multiple access (NOMA) systems using successive interference cancellation receivers over Rayleigh fading channels. It derives closed-form expressions for the BER in single-input single-output and multiple-input multiple-output NOMA systems. The analysis considers two categories of multiuser superposition transmission and verifies the analytical results through Monte Carlo simulation.
This document proposes a physical-layer network coding (PNC) scheme to improve throughput in wireless networks. PNC takes advantage of the broadcast nature of wireless transmissions by allowing signals from multiple nodes to be combined at the physical layer through modulation and demodulation. It demonstrates PNC for a three-node wireless linear network. With PNC, the three nodes can exchange information in two time slots, improving throughput by 100% over traditional scheduling and 50% over straightforward network coding. PNC mapping provides a way to perform network coding operations on electromagnetic signals directly at the physical layer by mapping their combination to binary additions.
This document analyzes and compares OFDMA and CDMA/WCDMA systems. It first discusses channel estimation techniques for OFDMA and CDMA, including minimum mean square error (MMSE) and least squares estimation. It then analyzes properties of OFDMA systems, including the effect of total power and cluster size on signal-to-interference plus noise ratio and signal-to-interference ratio. Finally, it compares the downlink capacities of OFDMA and WCDMA systems and proposes a new multiple access technique called OWCFDMA that combines advantages of both. The overall goal is to improve wireless communication system performance by integrating OFDMA and CDMA/WCDMA techniques.
Equalization & Channel Estimation of Block & Comb Type CodesAM Publications
ย
Multi-carrier code division multiple access is an attractive choice for high speed wireless communication as it mitigates
the problem of inter symbol interference and also exploits frequency diversity. The work described in this paper is my effort in this
direction. In this paper working of Transmitter and Receiver model of MCCDMA system is presented. We evaluated interference
and bit error rate for multicarrier code division multiple access wireless communication system. In this thesis my concern is find
out the effect of interference in MC-CDMA system. We find out the effect of number of users and signal power on different
parameters for MC-CDMA system. Simulations are given to support the system and receiver design. All the simulation is carried out on MATLAB tool.
Effect on Channel Capacity of Multi-User MIMO System in Crowded AreaIJEEE
ย
1) The document analyzes the effect of multi-user MIMO (MU-MIMO) systems on channel capacity in crowded urban areas compared to single-user MIMO (SU-MIMO) systems.
2) It finds that MU-MIMO can achieve higher channel capacity than SU-MIMO in urban environments due to lower spatial correlation between users, unlike assumptions of independent channels in MIMO transmission.
3) The improvement of MU-MIMO capacity over SU-MIMO increases with path visibility, with MU-MIMO showing better performance when path visibility is over 13%.
Wireless communication now has been focus to increase data rate and high performance. The
multi carrier on multi-hop communication system using relay's diversity technique which is
supported by a reliable coding is a system that may give high performance.
This research is developing a model of multi carrier CDMA on multi hop communication
system with diversity technique which is using Alamouti codes in Rayleigh fading channel. By
Alamouti research, Space Time Block Code (STBC) for MIMO system can perform high quality
signal at the receiver in the Rayleigh fading channel and the noisy system. In this research,
MIMO by STBC is applied to single antenna system (Distributed-STBC/DSTBC) with multi
carrier CDMA on multi hop wireless communication system (relay diversity) which is able to
reduce the complexity of the system but the system performance even can be maintained and
improved.
MC CDMA on multi hop wireless communication system with 2 hops is performing much better
than Single Input Single Output (SISO) system (1 hop system). Power needed for 1 hop system to
have the same quality as 2 hops system to reach BER 10-3 is 12 dB. And multi hop system needs
orthogonal symbol to send from relay than original symbol to reach better performance. 12.5
dB power up is needed for multi hop system which sent same symbol as transmitter than relay
system which sent orthogonal symbol.
This document compares several propagation path loss models - Okumura, Hata, ECC 33, Cost-231, and SUI - by estimating path losses and signal strengths at 950 MHz in urban, suburban, and rural areas. Path losses are estimated using each model and compared to measured practical data from those environments. The results show that the Hata model most closely matches the practical data across all three environments. Therefore, the Hata model is concluded to be the most suitable for predicting signal strength in urban, suburban, and rural areas.
In this research paper, substrate integrated waveguide (SIW) was proposed as a technique by
realizing bilateral edge walls to produce a compact 5G beam-steering antenna at 24 GHz. The beam
forming network is produced using SIW directional coupler perform as 2ร2 Butler Matrix (BM) fed with SIW
slotted waveguide antenna array. The output signal is steered from -29 degrees and +29 degrees when
the signal is fed to the respective input ports. If one of the input ports is fed, the signal is evenly distributed
between the adjacent output ports with 90 degree constant phase shift. The compact size of directional
coupler was designed by longitude slots on the surface of SIW substrate with bandwith of 16.85% at the
operating frequency. The proposed antenna produce gain of 6.34 dB at operating frequency and the
promising outcome of the beam steering make proposed design suitable for 5G communications especially
with tracking capabilities.
This document provides an overview of CDMA (Code Division Multiple Access), including its access schemes, coding, codes, spreading process, power control, handover, multipath and rake receivers. It describes how CDMA uses unique spreading codes to spread data before transmission. Receivers use correlators to despread the signal and filters to isolate the desired signal from interference. Power control is important to limit interference in this interference-limited system. Soft handovers allow connections between multiple cells. Multipath signals are combined using rake receivers to strengthen the signal.
Secure outage probability of cognitive radio network relying non-orthogonal m...journalBEEI
ย
This paper studies the secondary network relying relay selection to transmit signal from the secondary source (base station) to two destinations. Especially, two destinations are required non-orthogonal multiple access (NOMA) scheme and it benefits to implementation of the Internet of Things (IoT) systems. However, eavesdropper over-hears signal related link from selected relay to destination. This paper measure secure performance via metric, namely secure outage probability (SOP). In particular, signal to noise ratio (SNR) criterion is used to evalute SOP to provide reliable transmission to the terminal node. Main results indicates that the considered scheme provides performance gap among two signals at destination. The exactness of derived expressions is confirmed via numerical simulation.
Security performance analysis for power domain NOMA employing in cognitive ra...journalBEEI
ย
The power domain non-orthogonal multiple access (NOMA) technique introduces one of the fundamental characteristics and it exhibits the possibility of users to decode the messages of the other paired users on the same resources. In cognitive radio inspired NOMA (CR-NOMA), the base station (BS) has to serve untrusted users or users with different security clearance. This phenomenon raises a security threat particularly in such CR-NOMA. This paper develops a tractable analysis framework to evaluate the security performance of cooperative non-orthogonal multiple access (NOMA) in cognitive networks, where relay is able to serve two far NOMA users in the presence of external eavesdropper. In particular, we study the secrecy outage probability in a two-user NOMA system. This situation happens in practical the BS is pairing a legitimate user with another untrusted user. Main reason is that the non-uniform distribution in terms of trusted and untrusted users in the cell. By performing numerical results demonstrate the performance improvements of the proposed NOMA scheme in comparison to that of several situations in terms of different parameters. Furthermore, the security performance of NOMA is shown to verify the derived expressions.
Tractable computation in outage performance analysis of relay selection NOMATELKOMNIKA JOURNAL
ย
In recent years, using full-duplex (FD) transmission model provides enhanced bandwidth efficiency and improved performance for non-orthogonal multiple access (NOMA) system. However, lack of papers have investigated FD relay together with relay selection issue to improve performance of NOMA system. The problems in power allocation for two NOMA users satisfying fairness as well as relay selection strategy are studied in this paper. By considering the outage performance of proposed scheme with its vital result, general NOMA wireless networks can be developed for future networks due to its improved performance. Simulation results show that the relaying selection scheme can achieve a significant performance improvement by increasing required quantity of relay.
Outage and throughput performance of cognitive radio based power domain based...TELKOMNIKA JOURNAL
ย
This paper considers power domain based multiple access (PDMA) in cognitive radio network to serve numerous users who intend to multiple access to core network. In particular, we investigate the effect of signal combination scheme equipped at PDMA end-users as existence of direct link and relay link. This system model using relay scheme provides performance improvement on the outage probability of two PDMA end-users. We first propose a simple scheme of fixed power allocation to PDMA users who exhibit performance gap and fairness. Inspired by PDMA strategy, we then find signal to noise ratio (SNR) to detect separated signal for each user. In addition, the exact expressions of outage probability are derived in assumption that receiver can cancel out the interference completely with successive interference cancellation (SIC). By exploiting theoretical and simulation results, both considered combination schemes (Maximal Ratio Combining (MRC) and Selection Combining (SC) can achieve improved performance of two PDMA users significantly.
Analysis on the performance of pointing error effects for RIS-aided FSO link ...TELKOMNIKA JOURNAL
ย
In this study, we analysis on the performance of pointing error effects for reconfigurable intelligent surfeces (RISs) aided free-space optical (FSO) communication link over moderate to strong atmospheric turbulence channels. Among these solutions, RISs are considered as hardware technology to improve performance of optical wireless communication systems. Performance evaluation of systems is affected by atmospheric attenuation, pointing errors and moderate to strong atmospheric turbulence channels for quadrature amplitude modulation (QAM) technique. Atmospheric turbulence channel from moderate to strong is modeled using gamma-gamma distribution. Several numerical results obtained the average symbol error rate (ASER) performance versus beam waist radius and signal to noise ratio for three value of pointing error displacement standard deviation. From the results, it is show that with RIS assisted can effectively improve the performance and link distance of the wireless communication systems.
Enabling relay selection in non-orthogonal multiple access networks: direct a...TELKOMNIKA JOURNAL
ย
In this paper, we consider downlink non-orthogonal multiple access (NOMA) in which the relay selection (RS) scheme is enabled for cooperative networks. In particular, we investigate impact of the number of relays on system performance in term of outage probability. The main factors affecting on cooperative NOMA performance are fixed power allocations coefficients and the number of relay. This paper also indicate performance gap of the outage probabilities among two users the context of NOMA. To exhibit the exactness of derived formula, we match related results between simulation and analytical methods. Numerical results confirms that cooperative NOMA networks benefit from increasing the number of relay.
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...journalBEEI
ย
Non-orthogonal multiple access (NOMA) with advantages such as superior spectral efficiency has been considered as a promising multiple access technique for the fifth-generation (5G) mobile networks. In this research, we propose energy harvesting (EH) NOMA system relaying network over Rayleigh fading channel using selection combining at the receiver. Firstly, we investigate the system performance in terms of the closed-form expression of the outage probability (OP). Here we compare the OP of two destination users of the proposed system. Finally, all the results is convinced by the Monte Carlo simulation. From the results, we can confirm that all the analytical and simulation results are the same in connection with the primary system parameters.
Cooperative underlay cognitive radio assisted NOMA: secondary network improve...TELKOMNIKA JOURNAL
ย
In this paper, a downlink scenario of a non-orthogonal multiple access (NOMA) scheme with power constraint via spectrum sensing is considered. Such network provides improved outage performance and new scheme of NOMA-based cognitive radio (CR-NOMA) network are introduced. The different power allocation factors are examined subject to performance gap among these secondary NOMA users. To evaluate system performance, the exact outage probability expressions of secondary users are derived. Finally, the dissimilar performance problem in term of secondary users is illustrated via simulation, in which a power allocation scheme and the threshold rates are considered as main impacts of varying system performance. The simulation results show that the performance of CR-NOMA network can be improved significantly.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
ย
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Joint impacts of relaying scheme and wireless power transfer in multiple acce...journalBEEI
ย
This paper considers ergodic capacity of energy harvesting (EH) based cellular networks. Such a network employs non-orthogonal multiple access (NOMA) together with relaying scheme to serve two far users. In this system model, relay is facilitated power splitting (PS) protocol to implement energy harvesting (EH). To examine capacity, expressions of signal to noise ratio (SNR) need be computed to achieve capacity. Power allocation factors are different for two users in such system and hence performance gap happens to distinguish requirements for separated users. It can be confirmed that the proposed paradigm exhibits maximal achievable capacity in some scenarios of setting parameters. To confirm exactness of the analytical expressions and show advantages of the proposed EH-NOMA, simulation results are performed in terms of ergodic capacity.
Enabling full-duplex in multiple access technique for 5G wireless networks ov...TELKOMNIKA JOURNAL
ย
This document analyzes the performance of a two-user non-orthogonal multiple access (NOMA) network where one user is served directly by the base station and the other is served via an unmanned aerial vehicle (UAV) relay operating in full-duplex mode. It derives the exact outage probabilities of the two users under Rician fading channels. The analysis provides guidelines for designing UAV-enabled wireless networks using NOMA techniques. Key results include the outage probabilities accounting for interference at both the UAV relay and users under different self-interference conditions at the relay.
Performance enhancement of wireless sensor network by using non-orthogonal mu...nooriasukmaningtyas
ย
In this paper, we investigate a relaying wireless sensor network (WSN) with
the non-orthogonal multiple access (NOMA) and sensor node selection
schemes over rayleigh fading. Precisely, the system consists of two sensor
clusters, a sink node, and an amplify-and-forward (AF) relay. These sensors
applying the NOMA and sensor node selection schemes transmit the sensing
data from the sensor clusters via the relay to the sink. We derived the
expressions of outage probability and throughput for two sensor nodes. We
also provide numerical results to examine the behavior of the system. Finally,
we verify the validity of our analysis by using the monte-carlo simulation.
Adaptive relaying protocol for wireless energy harvesting and information pro...journalBEEI
ย
In order to satisfy the increasing data rate demands, the research in the fifth-generation (5G) wireless networks is ongoing, both in academia and industry. In this research, we propose and investigate adaptive relaying protocol (ARP) For wireless energy harvesting (EH) and information processing in NOMA systems. Firstly, we investigate and derive the closed-form and integral-form expressions of the outage probability (OP) of the model system. Then, all the results are convinced by the Monte Carlo simulation. The research results show that all the analytical and simulation results are the same in connection with the primary system parameters. This research can provide a recommendation for NOMA system network.
Performance analysis for power-splitting energy harvesting based two-way full...TELKOMNIKA JOURNAL
ย
Energy harvesting relay network is considered as the promising solution for a wireless
communication network in our time. In this research, we present and demonstrate the system performance
of the energy harvesting based two-way full-duplex relaying network over Nakagami-m fading
environment. Firstly, we propose the analytical expressions of the achievable throughput and outage
probability of the proposed system. In the second step, the effect of various system parameters on
the system performance is presented and investigated. In the final step, the analytical results are also
demonstrated by Monte-Carlo simulation. The numerical results demonstrated and convinced
the analytical and the simulation results are agreed with each other.
Performance of cluster-based cognitive multihop networks under joint impact o...TELKOMNIKA JOURNAL
ย
In this paper, we evaluate outage probability (OP) of a cluster-based multi-hop protocol operating
on an underlay cognitive radio (CR) mode. The primary network consists of multiple independent
transmit/receive pairs, and the primary transmitters seriously cause co-channel interference (CCI) to the
secondary receivers. To improve the outage performance for the secondary network under the joint impact
of the CCI and hardware imperfection, we employ the best relay selection at each hop. Moreover, the
destination is equipped with multiple antennas and uses the selection combining (SC) technique to
enhance the reliability of the data transmission at the last hop. For performance evaluation, we first derive
an exact formula of OP for the primary network which is used to calculate the transmit power of the
secondary transmitters. Next, an exact closed-form expression of the end-to-end OP for the secondary
network is derived over Rayleigh fading channels. We then perform Monte-Carlo simulations to validate
the derivations. The results present that the CCI caused by the primary operations significantly impacts on
the outage performance of the secondary network.
Employing non-orthogonal multiple access scheme in UAV-based wireless networksjournalBEEI
ย
This paper studies the two-hop transmission relying unmanned aerial vehicle (UAV) relays which is suitable to implement in the internet of things (IoT) systems. To enhance system performance in order to overcome the large scale fading between the base station (BS) and destination as well as achieve the higher spectrum efficiency, where non-orthogonal multiple access (NOMA) strategies were typically applied for UAV relays to implement massive connections transmission. In particular, outage probability is evaluated via signal to noise ratio (SNR) criterion so that the terminal node can obtain reasonable performance. The derivations and analysis results showed that the considered fixed power allocation scheme provides performance gap among two signals at destination.The numerical simulation confirmed the exactness of derived expressions in the UAV assisted system.
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...TELKOMNIKA JOURNAL
ย
In the future wireless systems, non-orthogonal multiple-access (NOMA) with partial relay selection scheme is considered as developing research topic. In this paper, dual-hop relaying systems is deployed for NOMA, in which the signals are communicated with the assistance of decode-and-forward (DF) scheme. This paper presents exact expressions for outage probability over independent Rayleigh fading channels, and two partial relay selection schemes are provided. Using analytical result and Monte-Carlo method, we introduce forwarding strategy selection for fixed user allocation and exactness of derived formula is checked. The presented simulations confirm the the advantage of such proposed NOMA, and the effectiveness of the proposed forwarding strategy.
Outage performance analysis of non-orthogonal multiple access systems with RF...IJECEIAES
ย
Non-orthogonal multiple access (NOMA) has drawn enormous attention from the research community as a promising technology for future wireless communications with increasing demands of capacity and throughput. Especially, in the light of fifth-generation (5G) communication where multiple internet-of-things (IoT) devices are connected, the application of NOMA to indoor wireless networks has become more interesting to study. In view of this, we investigate the NOMA technique in energy harvesting (EH) half-duplex (HD) decode-and-forward (DF) power-splitting relaying (PSR) networks over indoor scenarios which are characterized by log-normal fading channels. The system performance of such networks is evaluated in terms of outage probability (OP) and total throughput for delay-limited transmission mode whose expressions are derived herein. In general, we can see in details how different system parameters affect such networks thanks to the results from Monte Carlo simulations. For illustrating the accuracy of our analytical results, we plot them along with the theoretical ones for comparison.
In this paper, we design a secure transmission scheme in uplink and downlink of nonorthogonal
multiple access (NOMA) system. In this scenario, two pairs of base stationuser can operate under the presence of eavesdropper. The relay plays an important role to forward signals from group of base stations to serve distant users. However, the eavesdropper can overhear signal which leads to secure performance need be reconsidered. To provide secure performance, we derive the closed-form expressions for strictly positive secrecy capacity (SPSC). In addition, we rely on relay for enlarge coverage area. The channel conditions meet imperfect channel state information (CSI) which shows degraded secure performance. Results confirm the relationship between transmit power at the source and and SPSC how many main parameters affecting secure
performance metric. Furthermore, simulation results show that the uplink and downlink NOMA technique improves secure performance in the low SPSC region. We further conduct analysis by using Monte-Carlo simulations.
Physical security layer with friendly jammer in half-duplex relaying networks...journalBEEI
ย
In this research, thephysical security layer with a friendly jammerin half-duplex (HD) relaying networksover the Rayleigh fading channel is proposed and investigated. Firstly, we proposed the system model and the time switching,power splitting protocolsfor the system model. Then we conductedthe mathematical analysisfor deriving the exact analysis and asymptotic analysisintegral forms for intercept probability (IP). Finally, the analytical formulationis verified by the Monte Carlo simulation with all main system parameters. From the results, we can show that the simulation and analytical values are the same values.
Similar to Study on outage performance gap of two destinations on CR-NOMA network (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
ย
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the productโs manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naรฏve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
ย
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
ย
This document describes using a snake optimization algorithm to tune the gains of an enhanced proportional-integral controller for congestion avoidance in a TCP/AQM system. The controller aims to maintain a stable and desired queue size without noise or transmission problems. A linearized model of the TCP/AQM system is presented. An enhanced PI controller combining nonlinear gain and original PI gains is proposed. The snake optimization algorithm is then used to tune the parameters of the enhanced PI controller to achieve optimal system performance and response. Simulation results are discussed showing the proposed controller provides a stable and robust behavior for congestion control.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
ย
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
ย
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of usersโ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customerโs perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
ย
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
ย
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
ย
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
ย
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
ย
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the companyโs reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4ร4 Wallace tree multipli...TELKOMNIKA JOURNAL
ย
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4ร4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 ยตW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 ยตW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
ย
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
ย
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
ย
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
ย
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 ยฐC, 120 ยฐC, 150 ยฐC, and 180 ยฐC under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 ยฐC. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 ยฐC, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 ยฐC, 120 ยฐC, 150 ยฐC, and 180 ยฐC under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 ยฐC. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 ยฐC, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
ย
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
ย
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchairโs movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
ย
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systemsโ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Eulerโs equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
ย
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Online train ticket booking system project.pdfKamal Acharya
ย
Rail transport is one of the important modes of transport in India. Now a days we
see that there are railways that are present for the long as well as short distance
travelling which makes the life of the people easier. When compared to other
means of transport, a railway is the cheapest means of transport. The maintenance
of the railway database also plays a major role in the smooth running of this
system. The Online Train Ticket Management System will help in reserving the
tickets of the railways to travel from a particular source to the destination.
Better Builder Magazine brings together premium product manufactures and leading builders to create better differentiated homes and buildings that use less energy, save water and reduce our impact on the environment. The magazine is published four times a year.
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
ย
Study on outage performance gap of two destinations on CR-NOMA network
1. TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 1, February 2020, pp. 191~198
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i1.13271 ๏ฒ 191
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Study on outage performance gap of two destinations on
CR-NOMA network
Hong-Nhu Nguyen1
, Chi-Bao Le2
, Nhat-Tien Nguyen3
, Dinh-Thuan Do4
1,3
Faculty of Electronics and Telecommunications, Saigon University, Ho Chi Minh City, Vietnam
2,4
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh City, Vietnam
Article Info ABSTRACT
Article history:
Received Jun 2, 2019
Revised Nov 11, 2019
Accepted Nov 30, 2019
Non-orthogonal multiple access (NOMA) and cognitive radio (CR) are
promising to overcome spectral scarcity problem encountered in applications
implementations in wireless communication. Especially, massive
connectivity in such network is strict requirement in network deployment.
This study aims to improve spectral efficiency at two secondary destinations
by investigating a CR-NOMA network under situation of the perfect
successive interference cancellation (SIC). We also derive the exact outage
probability for secondary users. Furthermore, an approximate computation
method is applied to indicate more insights. It is confirmed that
the performance achieved together with performance gap among two users
can be obtained due to different power allocation factors assigned to users.
Keywords:
Cognitive radio
Non-orthogonal multiple access
SIC
This is an open access article under the CC BY-SA license.
Corresponding Author:
Dinh-Thuan Do,
Faculty of Electronics Technology,
Industrial University of Ho Chi Minh City (IUH),
Ho Chi Minh City, Vietnam.
Email: dodinhthuan@iuh.edu.vn
1. INTRODUCTION
The spectral efficient and energy-efficient requirements are necessary to satisfy the explosive
increase of mobile user in wireless system with high-rate services. However, high spectral efficiency (SE)
cannot be achieved since the fixed spectrum allocation strategy is adopted. Unfortunately, 30 percentages of
the licensed spectrum in the United States is fully occupied as the report from the Federal Communications
Commission [1]. By allowing the primary network to share its frequency band with the secondary network,
cognitive radio (CR) has been studied and hence SE improvement achieved [2]. In principle of CR, spectrum
sharing paradigm permits the secondary users (SUs) to operate together with the primary users (PUs) at the
same band and power constraint must be obeyed to limit interference impact caused by the PUs [3, 4].
Several techniques such as cellular networks, relay networks, and wireless sensor networks, benefit from
implementation of CR to provide the potential SE improvement.
To further provide massive connectivity, more advantages can be achieved by employing multiple
access for mobile users. In particular, the network allocates resource to users by dividing the total radio
resources with two underlying techniques, i.e. orthogonal multiple access (OMA) and non-orthogonal
multiple access (NOMA). The interference can be eliminated in OMA scheme while NOMA employs
successive interference cancellation (SIC) technique to alleviate interference from other usersโ signal [5]. By
exploiting the usersโ channel asymmetry, NOMA can remarkably enhance the SE and then the transmission
latency can be reduced [5-8]. The authors in [9] showed that the achievable rate region in the uplink NOMA
is improved in comparison with OMA and such analysis is adopted in wireless powered communication
2. ๏ฒ ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 191 - 198
192
(WPC) networks. In [10], main results reported that NOMA with advantage of improved user fairness and it
provide more benefits compared to OMA. It is further proved that NOMA performs better than OMA in both
downlink and uplink by achieving the problem of joint maximization of the downlink/uplink rates while
taking fairness between users is satisfied [11]. In [12], the authors presented energy efficiency in wireless
powered NOMA networks and system performance is evaluated. In addition, recent works [13-22]
considered advantage of NOMA to implement in emerging networks. In particular, this paper develops
system based on results in [23-25]. More specifically, in this paper, we formulate the received signal at the
secondary user (SU) which can extract the data signal by using SINR or SNR. The outage probability (OP) of
the SU are analyzed in details in terms of probability of SINR and SNR. The results show that CR-NOMA
provide fairness to two users in term of OP.
2. SYSTEM MODEL
We assume that the system model with a downlink dual-hop underlay cognitive
radioโnon-orthogonal multiple access (CR-NOMA) network shown in Figure 1, in which there are a primary
destination (PD) who is located in primary network (PN), a secondary source (BS), a relay (R) operating in
half-duplex mode and two destination users (U1; U2). The wireless channels follow Rayleigh fading-channel
๐ข with channel gain ๐บ ๐ข. These channels assigned as in Figure 1 are h0, h1, g1 and g2, are independent and
identically distributed (i.i.d.) zero-mean complex Gaussian random variables (RVs). Single antenna is
assumed at each node. In this scenario, a perfect channel state information (CSI) is adopted.
As Figure 1, the distances between nodes are denoted by h0, h1, g1 and g2. In CR-NOMA, the BS make
interference to PD. It is noted that R requires decode-and-forward (DF) mode to forward signal to far users.
It is assumed that R is placed very far from the transmit primary source PD and hence it cannot interfere with
the primary network as shown in Figure 1. The power constraint for operations of both primary network and
secondary network is considered in this context.
BS
U2
g1 U1
g2
Secondary link
Interference link
R
PD
h1
h0
Secondary
network
Primary network
Figure 1. NOMA in cognitive radio network
The transmit power at secondary source is set based on constraint as above consideration
๐๐ต๐ โค ๐๐๐ (
๐ผ
|โ0|2 , ๐ฬ ๐ต๐) (1)
where ๐ฬ ๐ต๐ and ๐ผ is denoted as the maximum average transmit power available at ๐ต๐ and interference
temperature constraint (ITC) at ๐๐ท, respectively. We call ๐1, ๐2as power allocation factors. In the first time
slot, R received the following signal
๐ฆ ๐ ( ๐) = โ1[โ ๐๐ต๐ ๐1 ๐ 1( ๐) + โ ๐๐ต๐ ๐2 ๐ 2( ๐)] + ๐ ๐ ( ๐) (2)
where โ0~๐๐ฉ(0, ๐บโ0), โ1~๐๐ฉ(0, ๐บโ1), ๐ ๐ ~๐๐ฉ(0, ๐ ๐
2), it is assumed that ๐1 > ๐2nd ๐1 + ๐2 = 1.
By using NOMA, to detect signal s2 R decodes and removes s1 from the received signal. Therefore,
it need be determined the signal-to-interference-plus noise ratio (SINR) and signal-to-noise ratio (SNR) to
detect s1 and s2 at R as follows
๐พ ๐ ,๐ 1
=
๐ ๐ต๐ ๐1|โ1|2
๐ ๐ต๐ ๐2|โ1|2+1
(3)
3. TELKOMNIKA Telecommun Comput El Control ๏ฒ
Study on outage performance gap of two destinations on CR-NOMA network (Hong-Nhu Nguyen)
193
where ๐ ๐ต๐ =
๐ ๐ต๐
๐ ๐
2
๐พ ๐ ,๐ 2
= ๐ ๐ต๐ ๐2|โ1|2
(4)
Then, within the second slot, R forwards the detected superimposed signal
โ ๐๐ ๐1 ๐ ฬ1( ๐) + โ ๐๐ ๐2 ๐ ฬ2( ๐), where PR is the transmitted power at R, ๐ ฬ1( ๐)and ๐ ฬ2( ๐)are the detected and
forwarded data to the respective receivers. Therefore, Ui receives the following signal:
๐ฆ ๐ ๐ ๐
( ๐) = ๐๐[โ ๐๐ ๐1 ๐ ฬ1( ๐) + โ ๐๐ ๐2 ๐ ฬ2( ๐)] + ๐ ๐ ๐ ๐
( ๐) (5)
where ๐ โ {1,2}, ๐๐~๐๐ฉ(0, ๐บ ๐๐) and ๐ ๐ ~๐๐ฉ(0, ๐ ๐ ๐ท ๐
2
). Furthermore, U2 implements SIC by detecting
๐ ฬ1( ๐)while considering its own data ๐ ฬ2( ๐)as a noise. The SINR of which can be written as:
๐พ ๐ ๐2,๐ 1
=
๐ ๐ ๐1|๐2|2
๐ ๐ ๐2|๐2|2+1
(6)
where ๐ ๐ =
๐ ๐
๐ ๐ ๐ท ๐
2 . Then, by alleviate interference existing in (6) it can be detected the remaining signal.
Therefore, to detects its own signal at U2 , SNR is given by
๐พ ๐ ๐2,๐ 2
= ๐ ๐ ๐2|๐2|2
(7)
It is worth noting that U1 is allocated with higher power factor, s1 has higher priority to detect compared with
remaining signal, then SINR is expressed by
๐พ ๐ ๐1,๐ 1
=
๐ ๐ ๐1|๐1|2
๐ ๐ ๐2|๐1|2+1
(8)
3. PERFORMANCE ANALYSIS AND NUMERICAL RESULTS
3.1. Outage probability analysis at user 1
In this section, we examine the outage probability (OP) for s1 and s2. In [10-13], the OP of a signal is
defined as the probability that the achievable rate is below than a predefined rate threshold ๐ ๐กโ๐, i.e.,
๐ ๐1 = ๐๐ [ ๐ 1 < ๐ ๐กโ๐]. Therefore, the OP of s1 can be derived as:
( )( ) ( )1 1 1 1 1 1 1
1
, , 1 , 1 , 1
2 2
1 1 1 1
1 12 2 2
2 1 2 1 0
2 2
1 1 1 1
1 12 2 2 2
2 1 0 2 1 0
Pr min , 1 Pr ,
1 Pr , ,
1 1
Pr , ,
1
U R s RU s R s RU s
BS R I
BS
BS R
A
I R I
BS
I R
a h a g
a h a g h
a h a g
a h h a g h
๏ง ๏ง ๏ง ๏ง ๏ง ๏ง ๏ง
๏ฒ ๏ฒ ๏ฒ
๏ง ๏ง ๏ฒ
๏ฒ ๏ฒ
๏ฒ ๏ฒ ๏ฒ
๏ง ๏ง ๏ฒ
๏ฒ ๏ฒ
= ๏ผ = โ ๏พ ๏พ
๏ฉ
๏ช ๏ฆ ๏ถ
๏ช ๏ง ๏ท= โ ๏พ ๏พ ๏ผ
๏ช ๏ง ๏ท+ +๏จ ๏ธ๏ช
๏ซ
๏ฆ
+ ๏พ ๏พ ๏พ
+ +๏จ
2A
๏น
๏บ๏ถ
๏บ๏ง ๏ท
๏บ๏ง ๏ท
๏ธ๏บ
๏ป
(9)
where ๐๐ผ =
๐ผ
๐ ๐ ๐ท
2 and ๐พ1 = 22๐ 1 โ 1 is SNR related to interference and SNR related to target rate ๐ 1of user ๐1
respectively. Based on distribution functions of wireless channels, it can be expressed as:
( ) ( ) ( )2 2 2
1 1 0
1 1 0
2 2 2
1 1 1 0
0
Pr , ,
1
I
BS
BS R
I
BS h R g BS h
I
h g h
BS R BS
A h g h f x dx f y dy f z dz
e e
๏ฒ
๏ฒ
๏น ๏น
๏ฒ ๏ฒ
๏น ๏น ๏ฒ
๏ฒ ๏ฒ ๏ฒ
๏ฒ๏น ๏น
๏ฒ ๏ฒ ๏ฒ
๏ฅ ๏ฅ
โ โ โ
๏ ๏ ๏
๏ฆ ๏ถ
= ๏พ ๏พ ๏ผ =๏ง ๏ท
๏จ ๏ธ
๏ฆ ๏ถ
= ๏ง โ ๏ท
๏ง ๏ท
๏จ ๏ธ
๏ฒ ๏ฒ ๏ฒ
(10)
4. ๏ฒ ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 191 - 198
194
where ๐ =
๐พ1
(๐1โ๐พ1 ๐2)
. In similar way, it can be computed the second part of (9) as:
( ) ( ) ( )2 2 2
1 10
1 0 1 10 1
2
2 2 20
2 1 1 0
11
1
1 0 1 0
Pr , ,
1 1
I
R IS
I
g BS h I h R gh I h
I
R BS
I
g hh
yI R BS
x
y
I h
g h I h h
h
A h g h f x dx f y f z dydz
e dx e dy e
๏น ๏ฒ ๏น
๏ฒ ๏ฒ๏ฒ
๏ฒ ๏น ๏น๏น
๏ฒ ๏ฒ ๏ฒ๏ฒ
๏น ๏ฒ
๏ฒ ๏ฒ
๏น ๏ฒ๏น
๏ฒ ๏ฒ ๏ฒ
๏ฒ
๏ฒ ๏น
๏ฅ ๏ฅ ๏ฅ
๏ฆ ๏ถ๏ฆ ๏ถ๏ฅ ๏ฅโ โ + โโ + ๏ง ๏ท๏ง ๏ท ๏ง ๏ท๏ง ๏ท๏ ๏ ๏ ๏๏ ๏ ๏จ ๏ธ๏จ ๏ธ
๏ฆ ๏ถ
๏ง ๏ท= ๏พ ๏พ ๏พ =
๏ง ๏ท
๏จ ๏ธ
๏
= =
๏ ๏ ๏ + ๏
๏ฒ ๏ฒ ๏ฒ
๏ฒ ๏ฒ
(11)
by replacing (9) by (10) and (11), (9) can be re-expressed as:
๐ซ๐1
= 1 โ [๐
โ
๐
๐ฬ ๐ต๐ ๐บโ1
โ
๐
๐ ๐ (1 โ ๐
โ
๐ ๐ผ
๐ฬ ๐ต๐ ๐บโ0) +
๐ ๐ผ ๐บโ1
๐ ๐ผ ๐บโ1+๐๐บโ0
๐
โ
๐ ๐ผ
๐ฬ ๐ต๐
(
1
๐บโ0
+
๐
๐ ๐ผ ๐บโ1
)โ
๐
๐ ๐ ๐บ ๐1] (12)
it is noted that the above formula is correct when๐1 > ๐พ1 ๐2.
3.2. Outage probability analysis if perfect SIC at user 2
Similar to the signal s1, at user ๐1, the OP of the signal s2 can be expressed as:
( )( ) ( )2 2 2 2 2 2 2
1
2
, , 2 , 2 , 2
2 2
2 1 2 2 2 2 2
0
2
22 1
2 2 2 22 2
0 0
Pr min , 1 Pr ,
1 Pr , ,
Pr , ,
pSIC
U R x RU x R x RU x
I
BS R BS
B
I I
R BS
B
a h a g
h
a h
a g
h h
๏ง ๏ง ๏ง ๏ง ๏ง ๏ง ๏ง
๏ฒ
๏ฒ ๏ง ๏ฒ ๏ง ๏ฒ
๏ฒ ๏ฒ
๏ง ๏ฒ ๏ง ๏ฒ
= ๏ผ = โ ๏พ ๏พ
๏ฉ
๏ช ๏ฆ ๏ถ
๏ช ๏ง ๏ท= โ ๏พ ๏พ ๏ผ
๏ช ๏ง ๏ท
๏จ ๏ธ๏ช
๏ซ
๏น
๏บ๏ฆ ๏ถ
๏บ๏ง ๏ท+ ๏พ ๏พ ๏พ
๏บ๏ง ๏ท
๏จ ๏ธ
๏ป
๏บ
(13)
where ๐พ2 = 22๐ 2 โ 1 with ๐ 2 corresponding target rate of ๐2. The first part and the second part of (13) can
be further computed by:
( ) ( ) ( )
2 2
1 2 2 2 0
2 2 2
1 2 0
2 2
2 2
2 2 22 2
1 1 2 0
2 2
0
Pr , ,
1
I
IBS
BS h R g BS h
BS R
I
BS R BS
a a
h g h
a a
B h g h
a a
f x dx f y dy f z dz e e
๏ฒ
๏ง ๏ง ๏ฒ๏ฒ
๏ฒ ๏ฒ ๏ฒ
๏ง ๏ง
๏ฒ ๏ฒ
๏ง ๏ง ๏ฒ
๏ฒ ๏ฒ ๏ฒ
๏ฅ ๏ฅ โ โ โ
๏ ๏ ๏
๏ฆ ๏ถ
= ๏พ ๏พ ๏ผ๏ง ๏ท
๏จ ๏ธ
๏ฆ ๏ถ
= = ๏ง โ ๏ท
๏ง ๏ท
๏จ ๏ธ
๏ฒ ๏ฒ ๏ฒ
(14)
then, other term can be given as:
( ) ( ) ( )2 2 2
2 10
2 2
2 2
22
2 0 1 20 1 2
2
2
2
2 2 22 0 2
2 1 2 0
2 2
11
1 2
2 0 1 2 2 0
Pr , ,
1 1
I
R BS I
I
g BS h I hh I h
I
R BS
I
g hh
yI R BS
a a
x
y
aa I h
g h I h h
a
h
B h g h f x dx f y f z dydz
a a
a
e dx e dy e
a
๏ง ๏ฒ ๏ง
๏ฒ ๏ฒ ๏ฒ
๏ฒ ๏ง๏ง
๏ฒ ๏ฒ๏ฒ
๏ง ๏ฒ
๏ฒ ๏ฒ
๏ง ๏ง ๏ฒ
๏ฒ ๏ฒ ๏ฒ
๏ฒ
๏ฒ ๏ง
๏ฅ ๏ฅ ๏ฅ
๏ฆ ๏ถ๏ฆ ๏ถ๏ฅ ๏ฅโ โ +โ + ๏ง๏ง ๏ท ๏ง๏ง ๏ท๏ ๏ ๏๏ ๏ ๏จ ๏ธ๏จ ๏ธ
๏ฆ ๏ถ
๏ง ๏ท= ๏พ ๏พ ๏พ =
๏ง ๏ท
๏จ ๏ธ
๏
= =
๏ ๏ ๏ + ๏
๏ฒ ๏ฒ ๏ฒ
๏ฒ ๏ฒ
2
2 2R g a
๏ง
๏ฒ
โ๏ท๏ท ๏
(15)
by substituting (15) and (14) into (13), (13) can be rewritten as:
5. TELKOMNIKA Telecommun Comput El Control ๏ฒ
Study on outage performance gap of two destinations on CR-NOMA network (Hong-Nhu Nguyen)
195
๐ซ๐2
๐๐๐ผ๐ถ
= 1 โ [๐
โ
๐พ2
๐ฬ ๐ต๐ ๐บโ1 ๐2
โ
๐พ2
๐ ๐ ๐บ ๐2 ๐2 (1 โ ๐
โ
๐ ๐ผ
๐ฬ ๐ต๐ ๐บโ0) +
๐๐ผ ๐บโ1 ๐2
๐๐ผ ๐บโ1 ๐2+๐พ2 ๐บโ0
๐
โ
๐ ๐ผ
๐ฬ ๐ต๐
(
1
๐บโ0
+
๐พ2
๐ ๐ผ ๐บโ1 ๐2
)โ
๐พ2
๐ ๐ ๐บ ๐2 ๐2] (16)
3.3. Outage analysis if imperfect SIC at user 2
The SINR and signal-to-noise ratio (SNR) of decoding s2 at R and at destination ๐2 can be
respectively written as:
๐พ ๐ ,๐ 2
=
๐ ๐ต๐ ๐2|โ1|2
๐ ๐ต๐|๐1|2+1
(17)
๐พ ๐ ๐2,๐ 2
=
๐ ๐ ๐2|๐2|2
๐ ๐ |๐2|2+1
(18)
then, the OP in case of imperfect SIC at ๐2can be calculated by:
( )( )
( )
2 2 2 2
2 2 2
1
, , 2
, 2 , 2
2 2
2 1 2 2
2 22 2 2
1 2 0
2 2
2 1 2 2
2 22 2 2 2
1 0 2 0
Pr min ,
1 Pr ,
1 Pr , ,
1 1
Pr , ,
1
ipSIC
U R x RD x
R x RD x
BS R I
BS
BS R
C
I R I
BS
I R
a h a g
f f h
a h a g
f h f h
๏ง ๏ง ๏ง
๏ง ๏ง ๏ง ๏ง
๏ฒ ๏ฒ ๏ฒ
๏ง ๏ง ๏ฒ
๏ฒ ๏ฒ
๏ฒ ๏ฒ ๏ฒ
๏ง ๏ง ๏ฒ
๏ฒ ๏ฒ
= ๏ผ
= โ ๏พ ๏พ
๏ฉ
๏ช ๏ฆ ๏ถ
๏ช ๏ง ๏ท= โ ๏พ ๏พ ๏ผ
๏ช ๏ง ๏ท+ +๏จ ๏ธ๏ช
๏ซ
๏ฆ ๏ถ
๏ง ๏ท+ ๏พ ๏พ ๏พ
๏ง + +๏จ ๏ธ
2C
๏น
๏บ
๏บ
๏บ๏ท
๏บ
๏ป
(19)
similarly, (19) can be rewritten as:
( )
2 2
1 2 2 20
2
2 2
0 2 2 2
11
2 1 2 2
1 2 2 2
11
12 10 2
2 2 2 2 2 2
2 2
1 1 1 1
1 1
I
h BS R gBS h
I
BS h BS R g
a a f fipSIC
U
h g
a afh
f R R g R g
I
e e
a a
a a e
a a
๏ง ๏ง๏ฒ
๏ฒ ๏ฒ๏ฒ
๏ฒ ๏ง ๏ง
๏ฒ ๏ฒ ๏ฒ
๏ง ๏ง
๏ง๏ง
๏ง ๏ฒ ๏ฒ ๏ฒ
๏ฒ
โโ
โ โโ
๏ ๏๏
โโ
โ โ โโ ๏ ๏
๏ฉ๏ฆ ๏ถ ๏ฆ ๏ถ๏ ๏๏ฆ ๏ถ
๏ช= โ ๏ง โ ๏ท + +๏ง ๏ท๏ง ๏ท ๏ง ๏ท๏ง ๏ท ๏ ๏๏ช ๏จ ๏ธ ๏จ ๏ธ๏จ ๏ธ๏ซ
๏น๏๏ฆ ๏ถ๏ฆ ๏ถ๏
๏บ+ + + ๏ + ๏ ๏๏ง ๏ท๏ง ๏ท
๏บ๏จ ๏ธ ๏จ ๏ธ ๏ป
(20)
3.4. Asymptotic analysis
This part provides approximate performance as extra insights in our conisdered system.
When ๐ โ โ, it can be applied ๐โ๐ฅ
โ 1 โ ๐ฅ, then approximate performance can be archived as below.
The approximate OP of user ๐1can be given by:
๐ซ๐๐ ๐ฆ๐,๐1
โ
= 1 โ [(1 โ
๐
๐ฬ ๐ต๐ ๐บโ1
โ
๐
๐ ๐
)
๐ ๐ผ
๐ฬ ๐ต๐ ๐บโ0
+
๐ ๐ผ ๐บโ1
๐ ๐ผ ๐บโ1+๐๐บโ0
(1 โ
๐ ๐ผ
๐บโ0 ๐ฬ ๐ต๐
โ
๐๐ ๐ผ
๐ ๐ผ ๐ฬ ๐ต๐ ๐บโ1
โ
๐
๐ ๐ ๐บ ๐1
)] (21)
the approximate OP of user ๐2in case of perfect SIC can be given by:
2
, 2 2
,
1 2 2 2 0
1 2 2 2
1 2 2 0 0 1 2 2 2
1 1
1
pSIC I
asym U
BS h R g BS h
I h I I
I h h h BS I BS h R g
a a
a
a a a
๏ง ๏ง ๏ฒ
๏ฒ ๏ฒ ๏ฒ
๏ฒ ๏ฒ ๏ฒ ๏ง ๏ง
๏ฒ ๏ง ๏ฒ ๏ฒ ๏ฒ ๏ฒ
๏ฅ
๏ฉ๏ฆ ๏ถ
= โ โ โ๏ช๏ง ๏ท๏ง ๏ท๏ ๏ ๏๏ช๏จ ๏ธ๏ซ
๏น๏ฆ ๏ถ๏
+ โ โ โ ๏บ๏ง ๏ท๏ง ๏ท๏ + ๏ ๏ ๏ ๏ ๏บ๏จ ๏ธ๏ป
(22)
6. ๏ฒ ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 191 - 198
196
the approximate OP of user ๐2in case of imperfect SIC can be formulated by:
( )
2
11
2 1 2 2, 2 2
,
0 1 2 2 2 1 2 2 2
11
12 10 2
2 2 2 2
2 2
2 2
2 2
0 2 2 2
1 1 1 1
1 1
1
f fipSIC I
asym U
BS h h BS R g h g
fh
f R R g
I
I
R g
BS h BS R g
a a a a
a
a a
a
a a
๏ง ๏ง๏ฒ ๏ง ๏ง
๏ฒ ๏ฒ ๏ฒ
๏ง๏ง
๏ง ๏ฒ ๏ฒ
๏ฒ
๏ฒ ๏ง ๏ง
๏ฒ
๏ฒ ๏ฒ ๏ฒ
โโ
๏ฅ
โโ
โ
๏ฉ ๏ฆ ๏ถ ๏ฆ ๏ถ๏ ๏๏ฆ ๏ถ
๏ช= โ โ โ + +๏ง ๏ท ๏ง ๏ท๏ง ๏ท๏ง ๏ท ๏ง ๏ท๏ ๏ ๏ ๏ ๏๏ช ๏จ ๏ธ๏จ ๏ธ ๏จ ๏ธ๏ซ
๏๏ฆ ๏ถ๏ฆ ๏ถ๏
+ + + ๏ + ๏๏ง ๏ท๏ง ๏ท
๏จ ๏ธ ๏จ ๏ธ
๏ฆ ๏ถ
๏ด ๏ โ โ โ๏ง ๏ท๏ง ๏ท๏ ๏๏จ ๏ธ
๏น
๏บ
๏บ๏ป
(23)
3.5. Throughput
In term of throughput, each user can be shown throughput performance as:
๐ ๐โ
= (1 โ ๐ซ ๐โ
)๐ โ (24)
where โโ {1,2}.
4. NUMERICAL RESULTS
In this section, we evaluate the performance of CR-NOMA, we set power allocation factors
๐1 = 0.8 and ๐2 = 0.2, the target rate is set to be ๐ 1 = 1 and ๐ 2 = 1.5, the channel gains ๐บโ0 = 1, ๐บโ1 = 1,
๐บ ๐1 = 1, ๐บ ๐2 = 0.4, ๐บ๐1 = ๐บ๐2 = 0.001. Interference between PN and SNR is ๐๐ผ = 40 ๐๐ต. Figure 2 and
Figure 3 plot the OP of two secondary destinations, as varying interference level ๐๐ผ and power allocation
factor, transmit SNR. Outage performance of ๐1 is better than that of ๐2. It can be seen that when higher
transmit SNR is required, outage performance will be improved significantly at considered range of SNR and
OP meets saturation trend as SNR is from 50 (dB) to 60 (dB).
The asymptotic curves match with the analytical curves very well at high SNR. This output confirms
exact approximate expressions of outage probability archived for two users. It is intuitively seen that no ITC
case exhibits lowest performance since no harmful interference from the PN exists. It can be seen
performance gap of these cases with different data rate is small, it exhibit acceptance performance for such
NOMA with acceptable small value of target rate. In addition, Monte-Carlo simulation results match with
analytical results very well in whole range of SNR. Figure 4 proved that higher rate result in worst case of
outage performance. In addition, as observation from Figure 5, throughput is high at high SNR and high ๐๐ผ.
Figure 2. Outage performance
versus SNR at secondary source
Figure 3. Impact of ITC on outage performance
versus SNR at secondary source
7. TELKOMNIKA Telecommun Comput El Control ๏ฒ
Study on outage performance gap of two destinations on CR-NOMA network (Hong-Nhu Nguyen)
197
Figure 4. Outage performance versus target
rates,with ๐๐ผ = 20 ( ๐๐ต), ๐1 = 0.9and ๐2 = 0.1
Figure 5. Throughput performance
5. CONCLUSION
In this paper, CR-NOMA networks over Rayleigh fading channels is studied by exploring
the end-to-end closed-form expressions to indicate outage performance . To compare the outage performance
of two secondary destinations, we derived expressions of outage probability and then numerical results are
provided performance comparisons of two users in CR-NOMA network. As main result, the fairness of two
users is satisfied as in numerical results by the proper selection of power allocation factors. Other condition is
that interference to primary network can be constrained. Moreover, comparison results of the outage behavior
showed that ๐1 performs better than ๐2 in considered scenarios. Finally, in the future work, we will consider
multiple users who operate in manner of CR-NOMA network.
ACKNOWLEDGEMENTS
The authors would like to thank the anonymous reviews for the helpful comments and
suggestions.This work is a part of the basic science research program CS2019-42 funded by the Saigon
University. Correspondence should be addressed to Dinh-Thuan Do (dodinhthuan@iuh.edu.vn).
REFERENCES
[1] Federal Communications Commisions, โFacilitating opportunities for flexible, efficient, and reliable spectrum use
employing cognitive radio technologies,โ Washington, DC, USA, Tech. Rep. FCC 02-155, [Online], Available:
https://www.fcc.gov/document/facilitating-opportunities-flexible-efficient-and-reliable-spectrum-1, 2003.
[2] J. Mitola and G. Q. Maguire, "Cognitive radio: making software radios more personal," in IEEE Personal
Communications, vol. 6, no. 4, pp. 13-18, Aug 1999.
[3] F. Zhou, N. C. Beaulieu, Z. Li, J. Si and P. Qi, "Energy-Efficient Optimal Power Allocation for Fading Cognitive
Radio Channels: Ergodic Capacity, Outage Capacity, and Minimum-Rate Capacity," IEEE Transactions on
Wireless Communications, vol. 15, no. 4, pp. 2741-2755, April 2016.
[4] N. Zhao, F. R. Yu, H. Sun and M. Li, "Adaptive Power Allocation Schemes for Spectrum Sharing in
Interference-Alignment-Based Cognitive Radio Networks," IEEE Transactions on Vehicular Technology,
vol. 65, no. 5, pp. 3700-3714, May 2016.
[5] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan and V. K. Bhargava, "A Survey on Non-Orthogonal
Multiple Access for 5G Networks: Research Challenges and Future Trends," IEEE Journal on Selected Areas in
Communications, vol. 35, no. 10, pp. 2181-2195, Oct 2017.
[6] T. L. Nguyen and Dinh-Thuan Do, "Exploiting Impacts of Intercell Interference on SWIPT-Assisted
Non-Orthogonal Multiple Access," Wireless Communications and Mobile Computing, vol. 2018, pp. 1-12,
Article ID 2525492, November 2018.
[7] L. Dai, B. Wang, Y. Yuan, S. Han, C. I and Z. Wang, "Non-orthogonal multiple access for 5G: solutions,
challenges, opportunities, and future research trends," IEEE Communications Magazine, vol. 53, no. 9,
pp. 74-81, September 2015.
[8] S. M. R. Islam, N. Avazov, O. A. Dobre, and K.-S. Kwak, โPower-Domain Non-Orthogonal Multiple Access
(NOMA) in 5G Systems: Potentials and Challenges,โ IEEE Commun. Surveys & Tutorials, vol. 19, no. 2,
pp. 721โ742, 2017.
8. ๏ฒ ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 191 - 198
198
[9] H. Chingoska, Z. Hadzi-Velkov, I. Nikoloska and N. Zlatanov, โResource Allocation in Wireless Powered
Communication Networks with Non-Orthogonal Multiple Access,โ IEEE Wireless Communications Letters, vol. 5,
no. 6, pp. 684-687, Dec 2016.
[10] P. D. Diamantoulakis, K. N. Pappi, Z. Ding and G. K. Karagiannidis, โWireless-Powered Communications with
Non-Orthogonal Multiple Access,โ IEEE Transactions on Wireless Communications, vol. 15, no. 12,
pp. 8422-8436, Dec 2016.
[11] P. D. Diamantoulakis, K. N. Pappi, G. K. Karagiannidis, H. Xing and A. Nallanathan, โJoint Downlink/Uplink
Design for Wireless Powered Networks with Interference,โ IEEE Access, vol. 5, pp. 1534-1547, 2017.
[12] Dinh-Thuan Do and Chi-Bao Le, โApplication of NOMA in Wireless System with Wireless Power Transfer
Scheme: Outage and Ergodic Capacity Performance Analysis,โ Sensors, vol. 18, no. 10, 2018.
[13] Dinh-Thuan Do and M. S. Van Nguyen, โDevice-to-device transmission modes in NOMA network with and
without Wireless Power Transfer,โ Computer Communications, vol. 139, No. 1, pp. 67-77, May 2019.
[14] D. Do, M. Vaezi and T. Nguyen, โWireless Powered Cooperative Relaying Using NOMA with Imperfect CSI,โ
2018 IEEE Globecom Workshops, Abu Dhabi, United Arab Emirates, pp. 1-6, 2018.
[15] D. T. Do and A. T. Le, โNOMA based cognitive relaying: Transceiver hardware impairments, relay selection
policies and outage performance comparison,โ Computer Communications, vol. 146, pp. 144-154, May 2019.
[16] Dinh-Thuan Do, Chi-Bao Le, A. T. Le, โCooperative underlay cognitive radio assisted NOMA: secondary network
improvement and outage performance,โ TELKOMNIKA Telecommunication Computing Electronics and Control,
vol. 17, no. 5, pp. 2147-2154, October 2019.
[17] Dinh-Thuan Do, T. T. Thi Nguyen, โExact Outage Performance Analysis of Amplify-and Forward-Aware
Cooperative NOMA,โ TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 16, no. 5,
pp. 1966-1973, October 2018.
[18] D. T. Do et al. โWireless power transfer enabled NOMA relay systems: two SIC modes and performance
evaluation,โ TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 17, no. 6, pp. 2697-2703,
December 2019.
[19] Thanh-Luan Nguyen and Dinh-Thuan Do, โPower Allocation Schemes for Wireless Powered NOMA Systems with
Imperfect CSI: System model and performance analysis,โ International Journal of Communication Systems,
vol. 31, no. 10, August 2018.
[20] D. T. Do, A. T. Le and B. M. Lee, โOn Performance Analysis of Underlay Cognitive Radio-Aware Hybrid
OMA/NOMA Networks with Imperfect CSI,โ Electronics, vol. 8, no. 7, July 2019.
[21] D. T. Do, A. T. Le, C. B. Le and B. M. Lee โOn Exact Outage and Throughput Performance of Cognitive Radio
based Non-Orthogonal Multiple Access Networks with and Without D2D Link,โ Sensors, vol. 19, July 2019.
[22] D. T. Do, M. S. Van Nguyen, T. A. Hoang, B.-M. Lee, โExploiting Joint Base Station Equipped Multiple Antenna
and Full-Duplex D2D Users in Power Domain Division Based Multiple Access Networks,โ Sensors, vol. 19,
no. 11, May 2019.
[23] D. T. Do, M. S. V. Nguyen, T. A. Hoang and M. Voznak, โNOMA-Assisted Multiple Access Scheme for IoT
Deployment: Relay Selection Model and Secrecy Performance Improvement,โ Sensors, vol. 19, no. 3, Feb 2019.
[24] G. Nauryzbayev, S. Arzykulov, T. A. Tsiftsis and M. Abdallah, โPerformance of Cooperative Underlay CR-NOMA
Networks over Nakagami-m Channels,โ 2018 IEEE International Conference on Communications Workshops
(ICC Workshops), pp. 1-6, 2018.
[25] G. Im and J. H. Lee, โOutage Probability for Cooperative NOMA Systems with Imperfect SIC in Cognitive Radio
Networks,โ in IEEE Communications Letters, vol. 23, no. 4, pp. 692-695, April 2019.