SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 11, No. 5, October 2021, pp. 4135~4142
ISSN: 2088-8708, DOI: 10.11591/ijece.v11i5.pp4135-4142  4135
Journal homepage: http://ijece.iaescore.com
Outage performance analysis of non-orthogonal multiple access
systems with RF energy harvesting
Hoang Thien Van1
, Vo Tien Anh2
, Danh Hong Le3
, Ma Quoc Phu4
, Hoang-Sy Nguyen5
1,2
The Saigon International University (SIU), Ho Chi Minh City, Vietnam
3
Van Hien University, Ho Chi Minh City, Vietnam
4
Binh Duong University, Thu Dau Mot City, Binh Duong Province, Vietnam
5
Eastem International University, Binh Duong Province, Vietnam
Article Info ABSTRACT
Article history:
Received Aug 16, 2020
Revised Mar 4, 2021
Accepted Mar 15, 2021
Non-orthogonal multiple access (NOMA) has drawn enormous attention
from the research community as a promising technology for future wireless
communications with increasing demands of capacity and throughput.
Especially, in the light of fifth-generation (5G) communication where
multiple internet-of-things (IoT) devices are connected, the application of
NOMA to indoor wireless networks has become more interesting to study. In
view of this, we investigate the NOMA technique in energy harvesting (EH)
half-duplex (HD) decode-and-forward (DF) power-splitting relaying (PSR)
networks over indoor scenarios which are characterized by log-normal fading
channels. The system performance of such networks is evaluated in terms of
outage probability (OP) and total throughput for delay-limited transmission
mode whose expressions are derived herein. In general, we can see in details
how different system parameters affect such networks thanks to the results
from Monte Carlo simulations. For illustrating the accuracy of our analytical
results, we plot them along with the theoretical ones for comparison.
Keywords:
Delay-limited transmission
Energy harvesting
Log-normal fading
NOMA
Outage probability
PSR-based protocol
This is an open access article under the CC BY-SA license.
Corresponding Author:
Danh Hong Le
Van Hien University
Ho Chi Minh City, Vietnam
Email: danhlh@vhu.edu.vn
1. INTRODUCTION
NOMA technology is well-known because of its ability to serve multiple users exploiting the same
resource block [1], [2]. Additionally, we can find in the existing literature the principal elements of NOMA,
which have been well investigated, such as superposition coding, successive interference cancellation (SIC).
Thus, it is needless to mention the convenience of deploying NOMA for the massive connectivity need of 5G
and IoT applications, [3]-[8]. Besides, simultaneous wireless information and power transfer (SWIPT)
systems, as the name suggests, exploit the radio frequency (RF) for EH and transferring data to power finite-
capacity batteries in wireless relaying networks, [9]-[14]. Indeed, we can find a wide range of studies relating
to EH relaying networks for outdoor scenarios in [15]-[24]. Specifically, in [15]-[17], the two relaying
protocols namely power splitting-based (PS) and time switching-based (TS) and their hybrid version in
cooperative relaying networks were studied. Additionally, two relay operation modes so-called amplify-and-
forward (AF) and decode-forward (DF) were investigated in [18]. Especially in [22]-[24], the authors
analyzed the system performance of SWIPT networks in the context of NOMA. On the contrary, despite
being excellent in modelling the indoor fading variations caused by building walls and moving objects
[25]-[27], log-normal fading channels are not studied that intensively comparing to common fading channels
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142
4136
such as Rayleigh, Nakagami-m. Among the rare study pieces concerning indoor log-normal fading, there
were [28-31]. Motivated by the above works, in this paper, we investigate the outage performance of NOMA
EH-HD-DF-PSR networks. Differing itself from the existing works, we analyze the networks in indoor
scenarios which we model with log-normal fading channels. In section 2, we describe the system model.
Section 3 presents the and throughput analytical expressions of the in-studied networks. In section 4, we
discuss the simulation results from the derived expressions. Finally, section 5 concludes our paper.
2. SYSTEM MODEL
Depicted in Figure 1(a) is the in-studied system model whereas a source (𝑆) attempts to transmit
data to two user devices denoted as π‘ˆ1 and π‘ˆ2. However, we can see that the 𝑆 β†’ π‘ˆ2 communication link
cannot be realized because of the in-between obstacle. Thereby, π‘ˆ1 is employed to relay the data transmitted
from 𝑆 to π‘ˆ2. It should be noted that π‘ˆ1 operates in DF mode and is energized by EH the signal that 𝑆 sends.
The 𝑆 β†’ π‘ˆ1 and π‘ˆ1 β†’ π‘ˆ2 distances are denoted with 𝑑1 and 𝑑2, and assigned with complex channel
coefficients of β„Ž1 and β„Ž2, respectively. Besides, there are two random variables (RVs) denoted as |β„Ž1|2
and
|β„Ž2|2
. The two RVs are independently and identically distributed (i.i.d) over the time block in the log-normal
distribution manner, with parameters 𝐿𝑁(πœ‡β„Ž1
, πœŽβ„Ž1
2
) and 𝐿𝑁(πœ‡β„Ž2
, πœŽβ„Ž2
2
), respectively. Additionally, we have πœ‡β„Ž1
is the mean value of 10 log(|β„Ž1|2), and πœŽβ„Žπ‘–
2
is the standard deviation of 10 log(|β„Žπ‘–|2), 𝑖 ∈ {1,2}. With regard
to Figure 1(b), we can see the PSR protocol that π‘ˆ1 employs in this study for EH and information
transmission (IT) over the time block 𝑇. Specifically, we have 𝑇 divided into two 𝑇/2 blocks with details
below.
(a)
(b)
Figure 1. This figure are; (a) System model, (b) PSR protocol
2.1. In first time slot
During the first time slot 𝑇/2, 𝑆 transmits data with a transmission power of 𝐸𝑠 to π‘ˆ1. The second
time slot, remaining 𝑇/2, is used for IT from π‘ˆ1 to π‘ˆ2. As aforementioned, PSR protocol π‘ˆ1 separates the 𝐸𝑠
to two portions for EH and IT purposes. We denote the power splitting (PS) ratio as 𝛼, 0 < 𝛼 < 1. Thereby,
at π‘ˆ1, the energy amount from EH process is:
2
1 1 ( / 2),
m
H S
E h d E T
 βˆ’
= (1)
Int J Elec & Comp Eng ISSN: 2088-8708 
Outage performance analysis of non-orthogonal multiple access systems … (Hoang Thien Van)
4137
where 0 < πœ‚ < 1 is the EH efficiency at the energy receiver, determined by the rectifier and EH circuitry that
π‘ˆ1 deploys. Employing the superposition property of S's transmit signal in NOMA scheme
[1, 2], the received signal at π‘ˆ1 is expressed as shown in (2).
( )
1 1
1 1 1 1 2 1 2 ,
m m
U S S U
y h a E d x a E d x n
βˆ’ βˆ’
= + + (2)
where we have π‘Ž1 and π‘Ž2 are, respectively, the power allocation coefficients of target signal π‘₯1and π‘₯2 that 𝑆
attempts to send to π‘ˆ1 and π‘ˆ2. Besides, we have the additive white Gaussian noise (AWGN) at π‘ˆ1, which is
π‘›π‘ˆ1
, with variance 𝑁0. We assume that 𝐸[π‘₯1
2] = 𝐸[π‘₯2
2] = 1. Since π‘ˆ2 is further from S than π‘ˆ1, it is allocated
with more power. Thus, we have π‘Ž2 > π‘Ž1 > 0, which satisfies π‘Ž1 + π‘Ž2 = 1. Additionally, the π‘ˆ1 consumes a
portion of the energy harvested for its operation while the rest is utilized for DF the received signal to π‘ˆ2.
Thereby, we can express the transmission power at π‘ˆ1with regard to the harvested energy 𝐸𝐻 as shown in (3).
1
2
2
1 1
1 1
( / 2)
.
( / 2) ( / 2)
m
S m
H
U S
h d E T
E
E h d E
T T


βˆ’
βˆ’
= = = (3)
Considering (2), we have the received signal-to-interference-plus-noise ratio (SINR) at π‘ˆ1 for
detecting the signal π‘₯2 of π‘ˆ2 formulated in (4).
1 2
2
1 1 2
, 2
1 1 1
(1 )
,
(1 ) 1
m
U x m
h d a
h d a
 

 
βˆ’
βˆ’
βˆ’
=
βˆ’ +
(4)
where 𝛿 = 𝐸𝑆/𝜎2
is the transmit signal-to-noise ratio (SNR).
The π‘ˆ1 receives then decodes the signal π‘₯1 and π‘₯2 from S with the help of SIC [23]. The received
SNR that π‘ˆ1 exploits to identify its signal, π‘₯1 is formulated as (5).
1 1
2
, 1 1 1
(1 ) .
m
U x h d a
  
βˆ’
= βˆ’ (5)
2.2. In second time slot
After decoding signal π‘₯2, π‘ˆ1 forwards the signal to π‘ˆ2. Hence, π‘ˆ2 receives the signal of:
( )
2 1 2
2 2 2 ,
m
U U U
y E d x h n
βˆ’
= + (6)
where π‘›π‘ˆ2
is denoted the additive white Gaussian noise (AWGN) at π‘ˆ2, with variance 𝑁0. We substitute (3)
into (6) to obtain:
2 2
1 2 1 2 2 .
m m
U U
y d d h h x n
 
βˆ’ βˆ’
= + (7)
Accordingly, the received SNR at π‘ˆ2 is expressed as
2 2
2 2
, 1 2 1 2 .
m m
U x h h d d
 
βˆ’ βˆ’
= (8)
3. PERFORMANCE ANALYSIS
3.1. Outage performance at π‘ˆ1
In NOMA setup, π‘ˆ1 is not subject to any outage event 𝑋 on condition that both the π‘₯1 and π‘₯2 that it
receives from 𝑆 are successfully decoded. Hence, with regard to (4) and (5), we can formulate the of π‘ˆ1
as shown in (9).
( )
1 1 2 2 1 1 1
, , ,
1 Pr , ,
U X U x th U x th
   
= βˆ’ ο€Ύ ο€Ύ (9)
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142
4138
where π›Ύπ‘‘β„Ž1
= 22π‘…π‘ˆ1 βˆ’ 1 and π›Ύπ‘‘β„Ž2
= 22π‘…π‘ˆ2 βˆ’ 1. To detect the π‘₯1 and π‘₯2, the target rates π‘…π‘ˆ1
and π‘…π‘ˆ2
are
deployed, respectively. The probability function is π‘ƒπ‘Ÿ(. ). In general, the of π‘ˆ1, deploying 𝑋 protocol, is
expressed in the Theorem 1 as (10),
Theorem 1.
( ) 1
1
1
1 2
,
ln(max , ) 2
1
1 erf ,
2 2 2
h
U X
h
   

 οƒΆ
 οƒΉ
βˆ’
 οƒ·
οƒͺ οƒΊ
= +
 οƒ·
οƒͺ οƒΊ
 
 οƒΈ
(10)
where 1
1
1 1
.
(1 )
th
m
a d


 
βˆ’
=
βˆ’
and
( )
2
2
2
1 2 1
(1 )
th
m
th
d a a


  
βˆ’
=
βˆ’ βˆ’
with 2
2 1 th
a a 
ο€Ύ .
Proof:
We can compute the of π‘ˆ1 from (11):
( )
( )
( )
( ) ( )
( )
1
2
, 1 1 2
2
1 1 2 1 2
1 Pr max ,
Pr max , max , ,
U X
X
h
h F
 
   
= βˆ’ ο‚³
= ο€Ό =
(11)
where 𝑋 = |β„Ž1|2
. We symbolized the cumulative distribution function (CDF) of the RV 𝑋 as
𝐹𝑋(π‘šπ‘Žπ‘₯(πœ”1, πœ”2)). Because 𝑋 is distributed following log-normal method, the CDF can be expressed as (12).
( )
( )
( )
( ) 1
1
1 2
1 2
ln max , 2
1
max , 1 erf ,
2 2 2
h
X
h
F
   
 

 οƒΆ
 οƒΉ
βˆ’
 οƒ·
οƒͺ οƒΊ
= +
 οƒ·
οƒͺ οƒΊ
 
 οƒΈ
(12)
where we have the error function erf[.] as shown in (13).
( )
2
0
2
erf( ) exp d
x
x t t

= βˆ’
 (13)
we substitute (12) into (11) to prove the correctness of the Theorem 1. The proof ends here.
3.2. Outage performance at 2
U
Additionally, π‘ˆ2 experiences outage event either when π‘ˆ1 fails to detect π‘₯2 to forward to π‘ˆ2 or π‘₯2 is
detected but cannot be recovered by π‘ˆ2. Thus, with regard to (4) and (8), the of π‘ˆ2 is expressed as (14).
( ) ( )
2 2 1 2 2 2 2 2 1 2 2
, , , ,
Pr Pr , .
U x U x th U x th U x th
     
= ο€Ό + ο€Ό ο€Ύ (14)
Similarly, the of π‘ˆ2, deploying signal π‘₯2 protocol, as shown in (15).
Theorem 2.
( ) ( )
1
2 2
2
1
1
2
, 2
2
ln( ) 2
1 1
1 exp 1 d ,
2 8
2
h
U x
h
h
x
x
x

 



ο‚₯
 οƒΆ
 οƒΆ
βˆ’
 οƒ·
 οƒ·
= + + βˆ’ +
 οƒ·
 οƒ·
 οƒ·
 οƒ·
 οƒΈ
 οƒΈ
 (15)
where 2
2
2
ln( ) 2
erfc ,
2 2
h
h
  

 οƒΉ
βˆ’
οƒͺ οƒΊ
=
οƒͺ οƒΊ
 
2
2
3
ln 2
erf ,
2 2
h
h
x

 

 οƒΉ
 οƒΆ
βˆ’
 οƒ·
οƒͺ οƒΊ
 οƒΈ
οƒͺ οƒΊ
=
οƒͺ οƒΊ
οƒͺ οƒΊ
 
and 2
3
1 2
.
th
m m
d d


 βˆ’ βˆ’
=
Proof:
From (14), we can rewrite the 2 2
,
U x as a sum of two probabilities as shown in (16).
Int J Elec & Comp Eng ISSN: 2088-8708 
Outage performance analysis of non-orthogonal multiple access systems … (Hoang Thien Van)
4139
( ) 2
2 2
1
2
2 2 2
, 1 2 1 2 2 2
1 2 1
Pr Pr , .
=
th
U x m m
h h h
d d h

 
 βˆ’ βˆ’
 οƒΆ
 οƒ·
ο€Ό + ο€Ύ ο€Ό
 οƒ·
 οƒΈ
(16)
It is possible to calculate the term 1 from
( ) 1
1
2
2
1 1 2
ln( ) 2
1
Pr 1 erf .
2 2 2
h
h
h
  


 οƒΆ
 οƒΉ
βˆ’
 οƒ·
οƒͺ οƒΊ
= ο€Ό = +
 οƒ·
οƒͺ οƒΊ
 
 οƒΈ
(17)
Additionally, 2 is calculated deploying the probability density function (PDF) and CDF of the
aforementioned 𝑋 and π‘Œ = |β„Ž2|2
as shown in (18):
2
2
2
1 2
1
( ) d ,
th
m
X Y m
d
f x F x
x
d


 βˆ’
βˆ’
ο‚₯  οƒΆ
=  οƒ·
 οƒ·
 οƒΈ
 (18)
where
( )
1
1
1
2
2
2
ln( ) 2
( ) exp ,
8
2 2
h
X
h
h
x
f x
x
 



 οƒΉ
βˆ’
οƒͺ οƒΊ
= βˆ’
οƒͺ οƒΊ
οƒͺ οƒΊ
 
(19)
and
2
2
2
2
1 2
1 2
1
ln 2
1 1
1 erf .
2 2 2
th
h
m m
th
Y m m
h
x
d d
F
x
d d

 
 
 
βˆ’ βˆ’
βˆ’ βˆ’
 οƒΆ
 οƒΉ
 οƒΆ
 οƒ·
βˆ’
οƒͺ οƒΊ
 οƒ·
 οƒ·
 οƒΆ  οƒ·
οƒͺ οƒΊ
 οƒΈ
= +
 οƒ·  οƒ·
οƒͺ οƒΊ
 οƒ·
 οƒΈ  οƒ·
οƒͺ οƒΊ
 οƒ·
οƒͺ οƒΊ
 
 οƒΈ
(20)
Finally, (17) and (18) are substituted into (16) to obtain the of π‘ˆ2, which is (15).
3.3. Total system throughput
It should be noted that for delay-limited transmission mode, the received signal is decoded by the
destination node one block after another. Additionally, we have S transmit information with a constant rate of
π‘…π‘ˆπ‘–
, 𝑖 ∈ (1,2), which is determined by the over log-normal fading channels. For 𝑋 protocol in the delay-
limited transmission mode [21], we have the total system throughput as shown in (21).
( ) ( )
1 1 2 2 2
, ,
1 1 ,
X U X U U x U
R R
 = βˆ’ + βˆ’ (21)
where 1,
U X and 2 2
,
U x are consecutively taken from Theorem 1 and 2. Besides, we have the target rates
being π‘…π‘ˆ1
and π‘…π‘ˆ2
, which are respectively the target rates for π‘ˆ1, π‘ˆ2 to detect π‘₯1 and π‘₯2.
4. RESULTS AND DISCUSSION
This section presents the Monte Carlo simulation results of the derived expressions to show how the
PS factor and the SNR affect the system performance in PSR NOMA scenario over log-normal fading
channels. The simulation results are plotted in addition to the analytical results for comparison. For the
simulations, we presume that πœ‚ = 1, π‘š = 2, 𝑑1 = 𝑑2 = 2 (m), πœŽβ„Ž1
= πœŽβ„Ž2
= 4 (𝑑𝐡), πœ‡β„Ž1
= πœ‡β„Ž2
= 3 (𝑑𝐡).
Moreover, we use the power allocation coefficients of NOMA for π‘ˆ1 and π‘ˆ2 being π‘Ž1 = 0.2 and π‘Ž2 = 0.8,
respectively. Last but not least, we set the target rates as π‘…π‘ˆ1
= 2 (bps/Hz) and π‘…π‘ˆ2
= 1 (bps/Hz). Figure 2
shows the versus the PS factor, 𝛼. In general, we can see that the probability that the outage event
happens to π‘ˆ1 is significantly higher than that of π‘ˆ2.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142
4140
The raises constantly to the increase of the PS factor for π‘ˆ1. However, for π‘ˆ2, the first
decreases to its minimum value as PS factor approaches (0.45), then rises to its maximum when the PS factor
grows further. Figures 3 and 4 consecutively plot the and the throughput versus the SNR. Specifically, in
Figure 3, it is obvious that the higher the SNR, the lower the O P. Besides, in Figure 4, we can observe that
the throughput-SNR curve of π‘ˆ1 is remarkably better than that of π‘ˆ2 starting from SNR=2.5 (dB). Last but
not least, we can see the impact of SNR on the with two different data transmission rates in Figure 5. In
particular, for the lower π‘…π‘ˆ1
= π‘…π‘ˆ2
= π‘…π‘ˆ0
value, the system performs better indicated by the fact that the
-SNR curve converges quicker to the zeroth floor, which indicates 100% success in data transmission. In
closing, we can see that the simulation results fit well the analytical ones showing the accuracy of our derived
expressions.
Figure 2. The performance versus the EH PS
factor
Figure 3. The performance versus the SNR
Figure 4. The throughput of two users versus the
SNR
Figure 5. The versus the SNR with two different
data transmission rates
5. CONCLUSION
In a nutshell, we investigate the and the total throughput for delay-limited transmission mode of
NOMA EH-HD-DF-PSR networks over log-normal fading channels. In general, we can conclude that the
SNR increase will lead to better throughput, which subsequently makes the smaller. Furthermore, the
network performs better with smaller data transmission rate and is more likely to experience outage event as
the PS factor becomes higher.
Int J Elec & Comp Eng ISSN: 2088-8708 
Outage performance analysis of non-orthogonal multiple access systems … (Hoang Thien Van)
4141
ACKNOWLEDGEMENTS
Thanks for the Saigon International University (SIU) funds supporting this project.
REFERENCES
[1] T. T. H. Ly, H. Sy Nguyen, T. Sang Nguyen, V. V. Huynh, T. Long Nguyen, and M. Voznak, "Outage Probability
Analysis in Relaying Cooperative Systems with NOMA Considering Power Splitting," Symmetry, vol. 11, no.1,
pp. 1-13, 2019, doi: 10.3390/sym11010072.
[2] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan and V. K. Bhargava, "A Survey on Non-Orthogonal
Multiple Access for 5G Networks: Research Challenges and Future Trends," in IEEE Journal on Selected Areas in
Communications, vol. 35, no. 10, pp. 2181-2195, Oct. 2017, doi: 10.1109/JSAC.2017.2725519.
[3] S. M. R. Islam, N. Avazov, O. A. Dobre and K. Kwak, "Power-Domain Non-Orthogonal Multiple Access (NOMA)
in 5G Systems: Potentials and Challenges," in IEEE Communications Surveys & Tutorials, vol. 19, no. 2,
pp. 721-742, Secondquarter 2017, doi: 10.1109/COMST.2016.2621116.
[4] Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan and L. Hanzo, "Non-orthogonal Multiple Access for 5G and
Beyond," Proceedings of the IEEE, vol. 105, no. 12, pp. 2347-2381, 2017, doi: 10.1109/JPROC.2017.2768666.
[5] Y. Sun, D. W. K. Ng, Z. Ding and R. Schober, "Optimal Joint Power and Subcarrier Allocation for Full-Duplex
Multicarrier Non-Orthogonal Multiple Access Systems," in IEEE Transactions on Communications, vol. 65, no. 3,
pp. 1077-1091, Mar. 2017, doi: 10.1109/TCOMM.2017.2650992.
[6] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao and L. Hanzo, "Enhancing the Physical Layer Security of Non-Orthogonal
Multiple Access in Large-Scale Networks," in IEEE Transactions on Wireless Communications, vol. 16, no. 3,
pp. 1656-1672, Mar. 2017, doi: 10.1109/TWC.2017.2650987.
[7] Z. Yang, Z. Ding, P. Fan and N. Al-Dhahir, "A General Power Allocation Scheme to Guarantee Quality of Service
in Downlink and Uplink NOMA Systems," in IEEE Transactions on Wireless Communications, vol. 15, no. 11,
pp. 7244-7257, Nov. 2016, doi: 10.1109/TWC.2016.2599521.
[8] X. Lu, P. Wang, D. Niyato and Z. Han, "Resource allocation in wireless networks with RF energy harvesting and
transfer," in IEEE Network, vol. 29, no. 6, pp. 68-75, Nov.-Dec. 2015, doi: 10.1109/MNET.2015.7340427.
[9] A. Ghasempour, β€œInternet of Things in Smart Grid: Architecture, Applications, Services, Key Technologies, and
Challenges,” Inventions journal, vol. 4, no. 1, pp. 1-12, 2019, doi: 10.3390/inventions4010022.
[10] E. Boshkovska, D. W. K. Ng, N. Zlatanov and R. Schober, "Practical Non-Linear Energy Harvesting Model and
Resource Allocation for SWIPT Systems," in IEEE Communications Letters, vol. 19, no. 12, pp. 2082-2085, Dec.
2015, doi: 10.1109/LCOMM.2015.2478460.
[11] Y. Zeng and R. Zhang, "Full-Duplex Wireless-Powered Relay With Self-Energy Recycling," in IEEE Wireless
Communications Letters, vol. 4, no. 2, pp. 201-204, Apr. 2015, doi: 10.1109/LWC.2015.2396516.
[12] T. D. Ponnimbaduge Perera, D. N. K. Jayakody, S. K. Sharma, S. Chatzinotas and J. Li, "Simultaneous Wireless
Information and Power Transfer (SWIPT): Recent Advances and Future Challenges," in IEEE Communications
Surveys & Tutorials, vol. 20, no. 1, pp. 264-302, Firstquarter 2018, doi: 10.1109/COMST.2017.2783901.
[13] A. Ibrahim., M. Iskandar, M. Salem, L. Awalin, A. Jusoh, and T. Sutikno, "Application of inductive coupling for
wireless power transfer," International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 11, no. 3,
pp. 1109-1116, 2020, doi: 10.11591/ijpeds.v11.i3.pp1109-1116.
[14] M. S. Tamrin and M. R. Ahmad, "Simulation of adaptive power management circuit for hybrid energy harvester
and real-time sensing application," International Journal of Power Electronics and Drive Systems (IJPEDS),
vol. 11, no. 2, pp. 656-666, 2020, doi: 10.11591/ijpeds.v11.i2.pp658-666.
[15] H.-S. Nguyen, D.-T. Do, and M. Voznak, "Two-way relaying networks in green communications for 5G: Optimal
throughput and trade off between relay distance on power splitting-based and time switching-based relaying
SWIPT," AEU-International Journal of Electronics and Communications, vol. 70, no. 12, pp. 1637-1644, 2016,
doi: 10.1016/j.aeue.2016.10.002.
[16] H.-S. Nguyen., D.-T. Do, T.-S. Nguyen, and M. Voznak, "Exploiting hybrid time switching-based and power
splitting-based relaying protocol inwireless powered communication networks with outdated channel state
information," Automatika, vol. 58, no. 1, pp. 111-118, 2017, doi: 10.1080/00051144.2017.1372124.
[17] Y. Ye, Y. Li, F. Zhou, N. Al-Dhahir and H. Zhang, "Power Splitting-Based SWIPT With Dual-Hop DF Relaying in
the Presence of a Direct Link," in IEEE Systems Journal, vol. 13, no. 2, pp. 1316-1319, Jun. 2019,
doi: 10.1109/JSYST.2018.2850944.
[18] H. Nguyen, A. Bui, D. Do and M. Voznak, "Imperfect channel state information of AF and DF energy harvesting
cooperative networks," in China Communications, vol. 13, no. 10, pp. 11-19, Oct. 2016,
doi: 10.1109/CC.2016.7732008.
[19] Y. Feng, V. C. M. Leung and F. Ji, "Performance Study for SWIPT Cooperative Communication Systems in
Shadowed Nakagami Fading Channels," in IEEE Transactions on Wireless Communications, vol. 17, no. 2,
pp. 1199-1211, Feb. 2018, doi: 10.1109/TWC.2017.2776933.
[20] H.-S. Nguyen, T.-S. Nguyen, V.-T. Vo, and M. Voznak, ”Hybrid full-duplex/half-duplex relay selection scheme
with optimal power under individual power constraints and energy harvesting,” Computer Communications,
vol. 124, pp. 31-44, 2018, doi: 10.1016/j.comcom.2018.04.014.
[21] Y. Ye, Y. Li, L. Shi, R. Q. Hu and H. Zhang, "Improved Hybrid Relaying Protocol for DF Relaying in the Presence
of a Direct Link," in IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 173-176, Feb. 2019,
doi: 10.1109/LWC.2018.2865476.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142
4142
[22] N. T. Do, D. B. Da Costa, T. Q. Duong and B. An, "A BNBF User Selection Scheme for NOMA-Based
Cooperative Relaying Systems With SWIPT," in IEEE Communications Letters, vol. 21, no. 3, pp. 664-667, Mar.
2017, doi: 10.1109/LCOMM.2016.2631606.
[23] H.-S. Nguyen.,T. T. Hoc Ly, T.-S. Nguyen, T.-L. Nguyen, and M. Voznak, "Outage performance analysis and
SWIPT optimization in energy-harvesting wireless sensor network deploying NOMA," Sensors, vol. 19, no. 3,
pp. 1-21, 2019, doi: 10.3390/s19030613.
[24] O. Abbasi, A. Ebrahimi and N. Mokari, "NOMA Inspired Cooperative Relaying System Using an AF Relay," in
IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 261-264, Feb. 2019, doi: 10.1109/LWC.2018.2869592.
[25] H. Hashemi, "The indoor radio propagation channel," in Proceedings of the IEEE, vol. 81, no. 7, pp. 943-968, Jul.
1993, doi: 10.1109/5.231342.
[26] A. Laourine, A. Stephenne and S. Affes, "On the capacity of log-normal fading channels," in IEEE Transactions on
Communications, vol. 57, no. 6, pp. 1603-1607, Jun. 2009, doi: 10.1109/TCOMM.2009.06.070109.
[27] H. Nouri, F. Touati and M. Uysal, "Diversity-Multiplexing Tradeoff for Log-Normal Fading Channels," in IEEE
Transactions on Communications, vol. 64, no. 7, pp. 3119-3129, Jul. 2016, doi: 10.1109/TCOMM.2016.2575019.
[28] K. M. Rabie, A. Salem, E. Alsusa and M. Alouini, "Energy-harvesting in cooperative AF relaying networks over
log-normal fading channels," 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur,
Malaysia, 2016, pp. 1-7, doi: 10.1109/ICC.2016.7511559.
[29] K. M. Rabie, B. Adebisi and M. Alouini, "Half-Duplex and Full-Duplex AF and DF Relaying With Energy-
Harvesting in Log-Normal Fading," in IEEE Transactions on Green Communications and Networking, vol. 1,
no. 4, pp. 468-480, Dec. 2017, doi: 10.1109/TGCN.2017.2740258.
[30] R. Katla and A. V. Babu, "Dual-hop full duplex relay networks over composite fading channels: Power and
locationoptimization," Physical Communication, vol. 30, pp. 1-14, 2018, doi: 10.1016/j.phycom.2018.07.009.
[31] Y. Liu, R. Xiao, J. Shen, and H. Yang, "Hybrid protocol for wireless energy harvesting network over log-normal
fading channel," The Journal of Engineering, vol. 2018, no. 6, pp. 339-341, 2018, doi: 10.1049/joe.2017.0892.

More Related Content

What's hot

Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksComparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksTELKOMNIKA JOURNAL
Β 
Lecture Notes: EEEC6440315 Communication Systems - Spectral Efficiency
Lecture Notes:  EEEC6440315 Communication Systems - Spectral EfficiencyLecture Notes:  EEEC6440315 Communication Systems - Spectral Efficiency
Lecture Notes: EEEC6440315 Communication Systems - Spectral EfficiencyAIMST University
Β 
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksMultiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksPanimalar Engineering College
Β 
Wc nots final unit new 7
Wc nots final unit new  7Wc nots final unit new  7
Wc nots final unit new 7SURESHA V
Β 
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...Sukhvinder Singh Malik
Β 
15082005174118 wca article-vfinal
15082005174118 wca article-vfinal15082005174118 wca article-vfinal
15082005174118 wca article-vfinalsunilareddyk
Β 
Popular Interview Wireless Question with Answer
Popular Interview Wireless Question with AnswerPopular Interview Wireless Question with Answer
Popular Interview Wireless Question with AnswerVARUN KUMAR
Β 
OFDMA principles
OFDMA principlesOFDMA principles
OFDMA principlesSteve Fowlkes
Β 
MIMO Channel Capacity
MIMO Channel CapacityMIMO Channel Capacity
MIMO Channel CapacityPei-Che Chang
Β 
Introduction to communication system lecture2
Introduction to communication system lecture2Introduction to communication system lecture2
Introduction to communication system lecture2Jumaan Ally Mohamed
Β 
FDM,OFDM,OFDMA,MIMO
FDM,OFDM,OFDMA,MIMOFDM,OFDM,OFDMA,MIMO
FDM,OFDM,OFDMA,MIMONadeem Rana
Β 
Bit Error rate of QAM
Bit Error rate of QAMBit Error rate of QAM
Bit Error rate of QAMAWANISHKUMAR84
Β 
WC & LTE 4G Broadband Module 2- 2019 by Prof.Suresha V
WC & LTE 4G Broadband  Module 2- 2019 by Prof.Suresha VWC & LTE 4G Broadband  Module 2- 2019 by Prof.Suresha V
WC & LTE 4G Broadband Module 2- 2019 by Prof.Suresha VSURESHA V
Β 
Optical Channel Capacity of MIMO system
Optical Channel Capacity of MIMO systemOptical Channel Capacity of MIMO system
Optical Channel Capacity of MIMO systemAWANISHKUMAR84
Β 

What's hot (20)

Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksComparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Β 
Lecture Notes: EEEC6440315 Communication Systems - Spectral Efficiency
Lecture Notes:  EEEC6440315 Communication Systems - Spectral EfficiencyLecture Notes:  EEEC6440315 Communication Systems - Spectral Efficiency
Lecture Notes: EEEC6440315 Communication Systems - Spectral Efficiency
Β 
Relay lte
Relay lteRelay lte
Relay lte
Β 
Tham khao ofdm tutorial
Tham khao ofdm tutorialTham khao ofdm tutorial
Tham khao ofdm tutorial
Β 
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksMultiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Β 
Wc nots final unit new 7
Wc nots final unit new  7Wc nots final unit new  7
Wc nots final unit new 7
Β 
Cellular Networks
Cellular NetworksCellular Networks
Cellular Networks
Β 
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
Β 
15082005174118 wca article-vfinal
15082005174118 wca article-vfinal15082005174118 wca article-vfinal
15082005174118 wca article-vfinal
Β 
Popular Interview Wireless Question with Answer
Popular Interview Wireless Question with AnswerPopular Interview Wireless Question with Answer
Popular Interview Wireless Question with Answer
Β 
OFDMA principles
OFDMA principlesOFDMA principles
OFDMA principles
Β 
MIMO Channel Capacity
MIMO Channel CapacityMIMO Channel Capacity
MIMO Channel Capacity
Β 
OFDMA
OFDMAOFDMA
OFDMA
Β 
Introduction to communication system lecture2
Introduction to communication system lecture2Introduction to communication system lecture2
Introduction to communication system lecture2
Β 
FDM,OFDM,OFDMA,MIMO
FDM,OFDM,OFDMA,MIMOFDM,OFDM,OFDMA,MIMO
FDM,OFDM,OFDMA,MIMO
Β 
Bit Error rate of QAM
Bit Error rate of QAMBit Error rate of QAM
Bit Error rate of QAM
Β 
WC & LTE 4G Broadband Module 2- 2019 by Prof.Suresha V
WC & LTE 4G Broadband  Module 2- 2019 by Prof.Suresha VWC & LTE 4G Broadband  Module 2- 2019 by Prof.Suresha V
WC & LTE 4G Broadband Module 2- 2019 by Prof.Suresha V
Β 
SCFDMA
SCFDMASCFDMA
SCFDMA
Β 
Lte antennas for 17EC81
Lte antennas for 17EC81Lte antennas for 17EC81
Lte antennas for 17EC81
Β 
Optical Channel Capacity of MIMO system
Optical Channel Capacity of MIMO systemOptical Channel Capacity of MIMO system
Optical Channel Capacity of MIMO system
Β 

Similar to Outage performance analysis of non-orthogonal multiple access systems with RF energy harvesting

Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...TELKOMNIKA JOURNAL
Β 
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...journalBEEI
Β 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMATELKOMNIKA JOURNAL
Β 
Hybrid protocol for wireless EH network over weibull fading channel: performa...
Hybrid protocol for wireless EH network over weibull fading channel: performa...Hybrid protocol for wireless EH network over weibull fading channel: performa...
Hybrid protocol for wireless EH network over weibull fading channel: performa...IJECEIAES
Β 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...journalBEEI
Β 
Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...journalBEEI
Β 
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...TELKOMNIKA JOURNAL
Β 
Tractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATELKOMNIKA JOURNAL
Β 
Intercept probability analysis in DF time switching full-duplex relaying netw...
Intercept probability analysis in DF time switching full-duplex relaying netw...Intercept probability analysis in DF time switching full-duplex relaying netw...
Intercept probability analysis in DF time switching full-duplex relaying netw...TELKOMNIKA JOURNAL
Β 
A new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systemsA new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systemsjournalBEEI
Β 
Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...journalBEEI
Β 
Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...journalBEEI
Β 
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...journalBEEI
Β 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...nooriasukmaningtyas
Β 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkTELKOMNIKA JOURNAL
Β 
Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisnooriasukmaningtyas
Β 
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...TELKOMNIKA JOURNAL
Β 
A Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
A Threshold Enhancement Technique for Chaotic On-Off Keying SchemeA Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
A Threshold Enhancement Technique for Chaotic On-Off Keying SchemeCSCJournals
Β 
Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...TELKOMNIKA JOURNAL
Β 

Similar to Outage performance analysis of non-orthogonal multiple access systems with RF energy harvesting (20)

Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...
Β 
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Β 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Β 
Hybrid protocol for wireless EH network over weibull fading channel: performa...
Hybrid protocol for wireless EH network over weibull fading channel: performa...Hybrid protocol for wireless EH network over weibull fading channel: performa...
Hybrid protocol for wireless EH network over weibull fading channel: performa...
Β 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...
Β 
Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...
Β 
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Β 
Tractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMA
Β 
Intercept probability analysis in DF time switching full-duplex relaying netw...
Intercept probability analysis in DF time switching full-duplex relaying netw...Intercept probability analysis in DF time switching full-duplex relaying netw...
Intercept probability analysis in DF time switching full-duplex relaying netw...
Β 
A new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systemsA new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systems
Β 
Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...
Β 
Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...
Β 
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Β 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Β 
5. 23769.pdf
5. 23769.pdf5. 23769.pdf
5. 23769.pdf
Β 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA network
Β 
Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysis
Β 
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Β 
A Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
A Threshold Enhancement Technique for Chaotic On-Off Keying SchemeA Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
A Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
Β 
Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...
Β 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
Β 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
Β 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
Β 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
Β 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
Β 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
Β 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
Β 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
Β 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
Β 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
Β 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
Β 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
Β 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
Β 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
Β 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
Β 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
Β 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
Β 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
Β 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
Β 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
Β 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
Β 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
Β 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Β 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Β 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
Β 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
Β 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
Β 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
Β 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
Β 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
Β 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
Β 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
Β 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
Β 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
Β 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Β 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
Β 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
Β 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
Β 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
Β 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
Β 

Recently uploaded

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
Β 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
Β 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
Β 
Call Us ≽ 8377877756 β‰Ό Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 β‰Ό Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 β‰Ό Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 β‰Ό Call Girls In Shastri Nagar (Delhi)dollysharma2066
Β 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
Β 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
Β 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
Β 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
Β 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
Β 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
Β 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
Β 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
Β 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
Β 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
Β 
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
Β 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
Β 

Recently uploaded (20)

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Β 
young call girls in Rajiv ChowkπŸ” 9953056974 πŸ” Delhi escort Service
young call girls in Rajiv ChowkπŸ” 9953056974 πŸ” Delhi escort Serviceyoung call girls in Rajiv ChowkπŸ” 9953056974 πŸ” Delhi escort Service
young call girls in Rajiv ChowkπŸ” 9953056974 πŸ” Delhi escort Service
Β 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
Β 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Β 
Call Us ≽ 8377877756 β‰Ό Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 β‰Ό Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 β‰Ό Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 β‰Ό Call Girls In Shastri Nagar (Delhi)
Β 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Β 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Β 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Β 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Β 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
Β 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
Β 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Β 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
Β 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Β 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
Β 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Β 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
Β 
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Β 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Β 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Β 

Outage performance analysis of non-orthogonal multiple access systems with RF energy harvesting

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 11, No. 5, October 2021, pp. 4135~4142 ISSN: 2088-8708, DOI: 10.11591/ijece.v11i5.pp4135-4142  4135 Journal homepage: http://ijece.iaescore.com Outage performance analysis of non-orthogonal multiple access systems with RF energy harvesting Hoang Thien Van1 , Vo Tien Anh2 , Danh Hong Le3 , Ma Quoc Phu4 , Hoang-Sy Nguyen5 1,2 The Saigon International University (SIU), Ho Chi Minh City, Vietnam 3 Van Hien University, Ho Chi Minh City, Vietnam 4 Binh Duong University, Thu Dau Mot City, Binh Duong Province, Vietnam 5 Eastem International University, Binh Duong Province, Vietnam Article Info ABSTRACT Article history: Received Aug 16, 2020 Revised Mar 4, 2021 Accepted Mar 15, 2021 Non-orthogonal multiple access (NOMA) has drawn enormous attention from the research community as a promising technology for future wireless communications with increasing demands of capacity and throughput. Especially, in the light of fifth-generation (5G) communication where multiple internet-of-things (IoT) devices are connected, the application of NOMA to indoor wireless networks has become more interesting to study. In view of this, we investigate the NOMA technique in energy harvesting (EH) half-duplex (HD) decode-and-forward (DF) power-splitting relaying (PSR) networks over indoor scenarios which are characterized by log-normal fading channels. The system performance of such networks is evaluated in terms of outage probability (OP) and total throughput for delay-limited transmission mode whose expressions are derived herein. In general, we can see in details how different system parameters affect such networks thanks to the results from Monte Carlo simulations. For illustrating the accuracy of our analytical results, we plot them along with the theoretical ones for comparison. Keywords: Delay-limited transmission Energy harvesting Log-normal fading NOMA Outage probability PSR-based protocol This is an open access article under the CC BY-SA license. Corresponding Author: Danh Hong Le Van Hien University Ho Chi Minh City, Vietnam Email: danhlh@vhu.edu.vn 1. INTRODUCTION NOMA technology is well-known because of its ability to serve multiple users exploiting the same resource block [1], [2]. Additionally, we can find in the existing literature the principal elements of NOMA, which have been well investigated, such as superposition coding, successive interference cancellation (SIC). Thus, it is needless to mention the convenience of deploying NOMA for the massive connectivity need of 5G and IoT applications, [3]-[8]. Besides, simultaneous wireless information and power transfer (SWIPT) systems, as the name suggests, exploit the radio frequency (RF) for EH and transferring data to power finite- capacity batteries in wireless relaying networks, [9]-[14]. Indeed, we can find a wide range of studies relating to EH relaying networks for outdoor scenarios in [15]-[24]. Specifically, in [15]-[17], the two relaying protocols namely power splitting-based (PS) and time switching-based (TS) and their hybrid version in cooperative relaying networks were studied. Additionally, two relay operation modes so-called amplify-and- forward (AF) and decode-forward (DF) were investigated in [18]. Especially in [22]-[24], the authors analyzed the system performance of SWIPT networks in the context of NOMA. On the contrary, despite being excellent in modelling the indoor fading variations caused by building walls and moving objects [25]-[27], log-normal fading channels are not studied that intensively comparing to common fading channels
  • 2.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142 4136 such as Rayleigh, Nakagami-m. Among the rare study pieces concerning indoor log-normal fading, there were [28-31]. Motivated by the above works, in this paper, we investigate the outage performance of NOMA EH-HD-DF-PSR networks. Differing itself from the existing works, we analyze the networks in indoor scenarios which we model with log-normal fading channels. In section 2, we describe the system model. Section 3 presents the and throughput analytical expressions of the in-studied networks. In section 4, we discuss the simulation results from the derived expressions. Finally, section 5 concludes our paper. 2. SYSTEM MODEL Depicted in Figure 1(a) is the in-studied system model whereas a source (𝑆) attempts to transmit data to two user devices denoted as π‘ˆ1 and π‘ˆ2. However, we can see that the 𝑆 β†’ π‘ˆ2 communication link cannot be realized because of the in-between obstacle. Thereby, π‘ˆ1 is employed to relay the data transmitted from 𝑆 to π‘ˆ2. It should be noted that π‘ˆ1 operates in DF mode and is energized by EH the signal that 𝑆 sends. The 𝑆 β†’ π‘ˆ1 and π‘ˆ1 β†’ π‘ˆ2 distances are denoted with 𝑑1 and 𝑑2, and assigned with complex channel coefficients of β„Ž1 and β„Ž2, respectively. Besides, there are two random variables (RVs) denoted as |β„Ž1|2 and |β„Ž2|2 . The two RVs are independently and identically distributed (i.i.d) over the time block in the log-normal distribution manner, with parameters 𝐿𝑁(πœ‡β„Ž1 , πœŽβ„Ž1 2 ) and 𝐿𝑁(πœ‡β„Ž2 , πœŽβ„Ž2 2 ), respectively. Additionally, we have πœ‡β„Ž1 is the mean value of 10 log(|β„Ž1|2), and πœŽβ„Žπ‘– 2 is the standard deviation of 10 log(|β„Žπ‘–|2), 𝑖 ∈ {1,2}. With regard to Figure 1(b), we can see the PSR protocol that π‘ˆ1 employs in this study for EH and information transmission (IT) over the time block 𝑇. Specifically, we have 𝑇 divided into two 𝑇/2 blocks with details below. (a) (b) Figure 1. This figure are; (a) System model, (b) PSR protocol 2.1. In first time slot During the first time slot 𝑇/2, 𝑆 transmits data with a transmission power of 𝐸𝑠 to π‘ˆ1. The second time slot, remaining 𝑇/2, is used for IT from π‘ˆ1 to π‘ˆ2. As aforementioned, PSR protocol π‘ˆ1 separates the 𝐸𝑠 to two portions for EH and IT purposes. We denote the power splitting (PS) ratio as 𝛼, 0 < 𝛼 < 1. Thereby, at π‘ˆ1, the energy amount from EH process is: 2 1 1 ( / 2), m H S E h d E T  βˆ’ = (1)
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708  Outage performance analysis of non-orthogonal multiple access systems … (Hoang Thien Van) 4137 where 0 < πœ‚ < 1 is the EH efficiency at the energy receiver, determined by the rectifier and EH circuitry that π‘ˆ1 deploys. Employing the superposition property of S's transmit signal in NOMA scheme [1, 2], the received signal at π‘ˆ1 is expressed as shown in (2). ( ) 1 1 1 1 1 1 2 1 2 , m m U S S U y h a E d x a E d x n βˆ’ βˆ’ = + + (2) where we have π‘Ž1 and π‘Ž2 are, respectively, the power allocation coefficients of target signal π‘₯1and π‘₯2 that 𝑆 attempts to send to π‘ˆ1 and π‘ˆ2. Besides, we have the additive white Gaussian noise (AWGN) at π‘ˆ1, which is π‘›π‘ˆ1 , with variance 𝑁0. We assume that 𝐸[π‘₯1 2] = 𝐸[π‘₯2 2] = 1. Since π‘ˆ2 is further from S than π‘ˆ1, it is allocated with more power. Thus, we have π‘Ž2 > π‘Ž1 > 0, which satisfies π‘Ž1 + π‘Ž2 = 1. Additionally, the π‘ˆ1 consumes a portion of the energy harvested for its operation while the rest is utilized for DF the received signal to π‘ˆ2. Thereby, we can express the transmission power at π‘ˆ1with regard to the harvested energy 𝐸𝐻 as shown in (3). 1 2 2 1 1 1 1 ( / 2) . ( / 2) ( / 2) m S m H U S h d E T E E h d E T T   βˆ’ βˆ’ = = = (3) Considering (2), we have the received signal-to-interference-plus-noise ratio (SINR) at π‘ˆ1 for detecting the signal π‘₯2 of π‘ˆ2 formulated in (4). 1 2 2 1 1 2 , 2 1 1 1 (1 ) , (1 ) 1 m U x m h d a h d a      βˆ’ βˆ’ βˆ’ = βˆ’ + (4) where 𝛿 = 𝐸𝑆/𝜎2 is the transmit signal-to-noise ratio (SNR). The π‘ˆ1 receives then decodes the signal π‘₯1 and π‘₯2 from S with the help of SIC [23]. The received SNR that π‘ˆ1 exploits to identify its signal, π‘₯1 is formulated as (5). 1 1 2 , 1 1 1 (1 ) . m U x h d a    βˆ’ = βˆ’ (5) 2.2. In second time slot After decoding signal π‘₯2, π‘ˆ1 forwards the signal to π‘ˆ2. Hence, π‘ˆ2 receives the signal of: ( ) 2 1 2 2 2 2 , m U U U y E d x h n βˆ’ = + (6) where π‘›π‘ˆ2 is denoted the additive white Gaussian noise (AWGN) at π‘ˆ2, with variance 𝑁0. We substitute (3) into (6) to obtain: 2 2 1 2 1 2 2 . m m U U y d d h h x n   βˆ’ βˆ’ = + (7) Accordingly, the received SNR at π‘ˆ2 is expressed as 2 2 2 2 , 1 2 1 2 . m m U x h h d d   βˆ’ βˆ’ = (8) 3. PERFORMANCE ANALYSIS 3.1. Outage performance at π‘ˆ1 In NOMA setup, π‘ˆ1 is not subject to any outage event 𝑋 on condition that both the π‘₯1 and π‘₯2 that it receives from 𝑆 are successfully decoded. Hence, with regard to (4) and (5), we can formulate the of π‘ˆ1 as shown in (9). ( ) 1 1 2 2 1 1 1 , , , 1 Pr , , U X U x th U x th     = βˆ’ ο€Ύ ο€Ύ (9)
  • 4.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142 4138 where π›Ύπ‘‘β„Ž1 = 22π‘…π‘ˆ1 βˆ’ 1 and π›Ύπ‘‘β„Ž2 = 22π‘…π‘ˆ2 βˆ’ 1. To detect the π‘₯1 and π‘₯2, the target rates π‘…π‘ˆ1 and π‘…π‘ˆ2 are deployed, respectively. The probability function is π‘ƒπ‘Ÿ(. ). In general, the of π‘ˆ1, deploying 𝑋 protocol, is expressed in the Theorem 1 as (10), Theorem 1. ( ) 1 1 1 1 2 , ln(max , ) 2 1 1 erf , 2 2 2 h U X h       οƒΆ  οƒΉ βˆ’  οƒ· οƒͺ οƒΊ = +  οƒ· οƒͺ οƒΊ    οƒΈ (10) where 1 1 1 1 . (1 ) th m a d     βˆ’ = βˆ’ and ( ) 2 2 2 1 2 1 (1 ) th m th d a a      βˆ’ = βˆ’ βˆ’ with 2 2 1 th a a  ο€Ύ . Proof: We can compute the of π‘ˆ1 from (11): ( ) ( ) ( ) ( ) ( ) ( ) 1 2 , 1 1 2 2 1 1 2 1 2 1 Pr max , Pr max , max , , U X X h h F       = βˆ’ ο‚³ = ο€Ό = (11) where 𝑋 = |β„Ž1|2 . We symbolized the cumulative distribution function (CDF) of the RV 𝑋 as 𝐹𝑋(π‘šπ‘Žπ‘₯(πœ”1, πœ”2)). Because 𝑋 is distributed following log-normal method, the CDF can be expressed as (12). ( ) ( ) ( ) ( ) 1 1 1 2 1 2 ln max , 2 1 max , 1 erf , 2 2 2 h X h F         οƒΆ  οƒΉ βˆ’  οƒ· οƒͺ οƒΊ = +  οƒ· οƒͺ οƒΊ    οƒΈ (12) where we have the error function erf[.] as shown in (13). ( ) 2 0 2 erf( ) exp d x x t t  = βˆ’  (13) we substitute (12) into (11) to prove the correctness of the Theorem 1. The proof ends here. 3.2. Outage performance at 2 U Additionally, π‘ˆ2 experiences outage event either when π‘ˆ1 fails to detect π‘₯2 to forward to π‘ˆ2 or π‘₯2 is detected but cannot be recovered by π‘ˆ2. Thus, with regard to (4) and (8), the of π‘ˆ2 is expressed as (14). ( ) ( ) 2 2 1 2 2 2 2 2 1 2 2 , , , , Pr Pr , . U x U x th U x th U x th       = ο€Ό + ο€Ό ο€Ύ (14) Similarly, the of π‘ˆ2, deploying signal π‘₯2 protocol, as shown in (15). Theorem 2. ( ) ( ) 1 2 2 2 1 1 2 , 2 2 ln( ) 2 1 1 1 exp 1 d , 2 8 2 h U x h h x x x       ο‚₯  οƒΆ  οƒΆ βˆ’  οƒ·  οƒ· = + + βˆ’ +  οƒ·  οƒ·  οƒ·  οƒ·  οƒΈ  οƒΈ  (15) where 2 2 2 ln( ) 2 erfc , 2 2 h h      οƒΉ βˆ’ οƒͺ οƒΊ = οƒͺ οƒΊ   2 2 3 ln 2 erf , 2 2 h h x      οƒΉ  οƒΆ βˆ’  οƒ· οƒͺ οƒΊ  οƒΈ οƒͺ οƒΊ = οƒͺ οƒΊ οƒͺ οƒΊ   and 2 3 1 2 . th m m d d    βˆ’ βˆ’ = Proof: From (14), we can rewrite the 2 2 , U x as a sum of two probabilities as shown in (16).
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708  Outage performance analysis of non-orthogonal multiple access systems … (Hoang Thien Van) 4139 ( ) 2 2 2 1 2 2 2 2 , 1 2 1 2 2 2 1 2 1 Pr Pr , . = th U x m m h h h d d h     βˆ’ βˆ’  οƒΆ  οƒ· ο€Ό + ο€Ύ ο€Ό  οƒ·  οƒΈ (16) It is possible to calculate the term 1 from ( ) 1 1 2 2 1 1 2 ln( ) 2 1 Pr 1 erf . 2 2 2 h h h       οƒΆ  οƒΉ βˆ’  οƒ· οƒͺ οƒΊ = ο€Ό = +  οƒ· οƒͺ οƒΊ    οƒΈ (17) Additionally, 2 is calculated deploying the probability density function (PDF) and CDF of the aforementioned 𝑋 and π‘Œ = |β„Ž2|2 as shown in (18): 2 2 2 1 2 1 ( ) d , th m X Y m d f x F x x d    βˆ’ βˆ’ ο‚₯  οƒΆ =  οƒ·  οƒ·  οƒΈ  (18) where ( ) 1 1 1 2 2 2 ln( ) 2 ( ) exp , 8 2 2 h X h h x f x x       οƒΉ βˆ’ οƒͺ οƒΊ = βˆ’ οƒͺ οƒΊ οƒͺ οƒΊ   (19) and 2 2 2 2 1 2 1 2 1 ln 2 1 1 1 erf . 2 2 2 th h m m th Y m m h x d d F x d d        βˆ’ βˆ’ βˆ’ βˆ’  οƒΆ  οƒΉ  οƒΆ  οƒ· βˆ’ οƒͺ οƒΊ  οƒ·  οƒ·  οƒΆ  οƒ· οƒͺ οƒΊ  οƒΈ = +  οƒ·  οƒ· οƒͺ οƒΊ  οƒ·  οƒΈ  οƒ· οƒͺ οƒΊ  οƒ· οƒͺ οƒΊ    οƒΈ (20) Finally, (17) and (18) are substituted into (16) to obtain the of π‘ˆ2, which is (15). 3.3. Total system throughput It should be noted that for delay-limited transmission mode, the received signal is decoded by the destination node one block after another. Additionally, we have S transmit information with a constant rate of π‘…π‘ˆπ‘– , 𝑖 ∈ (1,2), which is determined by the over log-normal fading channels. For 𝑋 protocol in the delay- limited transmission mode [21], we have the total system throughput as shown in (21). ( ) ( ) 1 1 2 2 2 , , 1 1 , X U X U U x U R R  = βˆ’ + βˆ’ (21) where 1, U X and 2 2 , U x are consecutively taken from Theorem 1 and 2. Besides, we have the target rates being π‘…π‘ˆ1 and π‘…π‘ˆ2 , which are respectively the target rates for π‘ˆ1, π‘ˆ2 to detect π‘₯1 and π‘₯2. 4. RESULTS AND DISCUSSION This section presents the Monte Carlo simulation results of the derived expressions to show how the PS factor and the SNR affect the system performance in PSR NOMA scenario over log-normal fading channels. The simulation results are plotted in addition to the analytical results for comparison. For the simulations, we presume that πœ‚ = 1, π‘š = 2, 𝑑1 = 𝑑2 = 2 (m), πœŽβ„Ž1 = πœŽβ„Ž2 = 4 (𝑑𝐡), πœ‡β„Ž1 = πœ‡β„Ž2 = 3 (𝑑𝐡). Moreover, we use the power allocation coefficients of NOMA for π‘ˆ1 and π‘ˆ2 being π‘Ž1 = 0.2 and π‘Ž2 = 0.8, respectively. Last but not least, we set the target rates as π‘…π‘ˆ1 = 2 (bps/Hz) and π‘…π‘ˆ2 = 1 (bps/Hz). Figure 2 shows the versus the PS factor, 𝛼. In general, we can see that the probability that the outage event happens to π‘ˆ1 is significantly higher than that of π‘ˆ2.
  • 6.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142 4140 The raises constantly to the increase of the PS factor for π‘ˆ1. However, for π‘ˆ2, the first decreases to its minimum value as PS factor approaches (0.45), then rises to its maximum when the PS factor grows further. Figures 3 and 4 consecutively plot the and the throughput versus the SNR. Specifically, in Figure 3, it is obvious that the higher the SNR, the lower the O P. Besides, in Figure 4, we can observe that the throughput-SNR curve of π‘ˆ1 is remarkably better than that of π‘ˆ2 starting from SNR=2.5 (dB). Last but not least, we can see the impact of SNR on the with two different data transmission rates in Figure 5. In particular, for the lower π‘…π‘ˆ1 = π‘…π‘ˆ2 = π‘…π‘ˆ0 value, the system performs better indicated by the fact that the -SNR curve converges quicker to the zeroth floor, which indicates 100% success in data transmission. In closing, we can see that the simulation results fit well the analytical ones showing the accuracy of our derived expressions. Figure 2. The performance versus the EH PS factor Figure 3. The performance versus the SNR Figure 4. The throughput of two users versus the SNR Figure 5. The versus the SNR with two different data transmission rates 5. CONCLUSION In a nutshell, we investigate the and the total throughput for delay-limited transmission mode of NOMA EH-HD-DF-PSR networks over log-normal fading channels. In general, we can conclude that the SNR increase will lead to better throughput, which subsequently makes the smaller. Furthermore, the network performs better with smaller data transmission rate and is more likely to experience outage event as the PS factor becomes higher.
  • 7. Int J Elec & Comp Eng ISSN: 2088-8708  Outage performance analysis of non-orthogonal multiple access systems … (Hoang Thien Van) 4141 ACKNOWLEDGEMENTS Thanks for the Saigon International University (SIU) funds supporting this project. REFERENCES [1] T. T. H. Ly, H. Sy Nguyen, T. Sang Nguyen, V. V. Huynh, T. Long Nguyen, and M. Voznak, "Outage Probability Analysis in Relaying Cooperative Systems with NOMA Considering Power Splitting," Symmetry, vol. 11, no.1, pp. 1-13, 2019, doi: 10.3390/sym11010072. [2] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan and V. K. Bhargava, "A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends," in IEEE Journal on Selected Areas in Communications, vol. 35, no. 10, pp. 2181-2195, Oct. 2017, doi: 10.1109/JSAC.2017.2725519. [3] S. M. R. Islam, N. Avazov, O. A. Dobre and K. Kwak, "Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges," in IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 721-742, Secondquarter 2017, doi: 10.1109/COMST.2016.2621116. [4] Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan and L. Hanzo, "Non-orthogonal Multiple Access for 5G and Beyond," Proceedings of the IEEE, vol. 105, no. 12, pp. 2347-2381, 2017, doi: 10.1109/JPROC.2017.2768666. [5] Y. Sun, D. W. K. Ng, Z. Ding and R. Schober, "Optimal Joint Power and Subcarrier Allocation for Full-Duplex Multicarrier Non-Orthogonal Multiple Access Systems," in IEEE Transactions on Communications, vol. 65, no. 3, pp. 1077-1091, Mar. 2017, doi: 10.1109/TCOMM.2017.2650992. [6] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao and L. Hanzo, "Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks," in IEEE Transactions on Wireless Communications, vol. 16, no. 3, pp. 1656-1672, Mar. 2017, doi: 10.1109/TWC.2017.2650987. [7] Z. Yang, Z. Ding, P. Fan and N. Al-Dhahir, "A General Power Allocation Scheme to Guarantee Quality of Service in Downlink and Uplink NOMA Systems," in IEEE Transactions on Wireless Communications, vol. 15, no. 11, pp. 7244-7257, Nov. 2016, doi: 10.1109/TWC.2016.2599521. [8] X. Lu, P. Wang, D. Niyato and Z. Han, "Resource allocation in wireless networks with RF energy harvesting and transfer," in IEEE Network, vol. 29, no. 6, pp. 68-75, Nov.-Dec. 2015, doi: 10.1109/MNET.2015.7340427. [9] A. Ghasempour, β€œInternet of Things in Smart Grid: Architecture, Applications, Services, Key Technologies, and Challenges,” Inventions journal, vol. 4, no. 1, pp. 1-12, 2019, doi: 10.3390/inventions4010022. [10] E. Boshkovska, D. W. K. Ng, N. Zlatanov and R. Schober, "Practical Non-Linear Energy Harvesting Model and Resource Allocation for SWIPT Systems," in IEEE Communications Letters, vol. 19, no. 12, pp. 2082-2085, Dec. 2015, doi: 10.1109/LCOMM.2015.2478460. [11] Y. Zeng and R. Zhang, "Full-Duplex Wireless-Powered Relay With Self-Energy Recycling," in IEEE Wireless Communications Letters, vol. 4, no. 2, pp. 201-204, Apr. 2015, doi: 10.1109/LWC.2015.2396516. [12] T. D. Ponnimbaduge Perera, D. N. K. Jayakody, S. K. Sharma, S. Chatzinotas and J. Li, "Simultaneous Wireless Information and Power Transfer (SWIPT): Recent Advances and Future Challenges," in IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 264-302, Firstquarter 2018, doi: 10.1109/COMST.2017.2783901. [13] A. Ibrahim., M. Iskandar, M. Salem, L. Awalin, A. Jusoh, and T. Sutikno, "Application of inductive coupling for wireless power transfer," International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 11, no. 3, pp. 1109-1116, 2020, doi: 10.11591/ijpeds.v11.i3.pp1109-1116. [14] M. S. Tamrin and M. R. Ahmad, "Simulation of adaptive power management circuit for hybrid energy harvester and real-time sensing application," International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 11, no. 2, pp. 656-666, 2020, doi: 10.11591/ijpeds.v11.i2.pp658-666. [15] H.-S. Nguyen, D.-T. Do, and M. Voznak, "Two-way relaying networks in green communications for 5G: Optimal throughput and trade off between relay distance on power splitting-based and time switching-based relaying SWIPT," AEU-International Journal of Electronics and Communications, vol. 70, no. 12, pp. 1637-1644, 2016, doi: 10.1016/j.aeue.2016.10.002. [16] H.-S. Nguyen., D.-T. Do, T.-S. Nguyen, and M. Voznak, "Exploiting hybrid time switching-based and power splitting-based relaying protocol inwireless powered communication networks with outdated channel state information," Automatika, vol. 58, no. 1, pp. 111-118, 2017, doi: 10.1080/00051144.2017.1372124. [17] Y. Ye, Y. Li, F. Zhou, N. Al-Dhahir and H. Zhang, "Power Splitting-Based SWIPT With Dual-Hop DF Relaying in the Presence of a Direct Link," in IEEE Systems Journal, vol. 13, no. 2, pp. 1316-1319, Jun. 2019, doi: 10.1109/JSYST.2018.2850944. [18] H. Nguyen, A. Bui, D. Do and M. Voznak, "Imperfect channel state information of AF and DF energy harvesting cooperative networks," in China Communications, vol. 13, no. 10, pp. 11-19, Oct. 2016, doi: 10.1109/CC.2016.7732008. [19] Y. Feng, V. C. M. Leung and F. Ji, "Performance Study for SWIPT Cooperative Communication Systems in Shadowed Nakagami Fading Channels," in IEEE Transactions on Wireless Communications, vol. 17, no. 2, pp. 1199-1211, Feb. 2018, doi: 10.1109/TWC.2017.2776933. [20] H.-S. Nguyen, T.-S. Nguyen, V.-T. Vo, and M. Voznak, ”Hybrid full-duplex/half-duplex relay selection scheme with optimal power under individual power constraints and energy harvesting,” Computer Communications, vol. 124, pp. 31-44, 2018, doi: 10.1016/j.comcom.2018.04.014. [21] Y. Ye, Y. Li, L. Shi, R. Q. Hu and H. Zhang, "Improved Hybrid Relaying Protocol for DF Relaying in the Presence of a Direct Link," in IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 173-176, Feb. 2019, doi: 10.1109/LWC.2018.2865476.
  • 8.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142 4142 [22] N. T. Do, D. B. Da Costa, T. Q. Duong and B. An, "A BNBF User Selection Scheme for NOMA-Based Cooperative Relaying Systems With SWIPT," in IEEE Communications Letters, vol. 21, no. 3, pp. 664-667, Mar. 2017, doi: 10.1109/LCOMM.2016.2631606. [23] H.-S. Nguyen.,T. T. Hoc Ly, T.-S. Nguyen, T.-L. Nguyen, and M. Voznak, "Outage performance analysis and SWIPT optimization in energy-harvesting wireless sensor network deploying NOMA," Sensors, vol. 19, no. 3, pp. 1-21, 2019, doi: 10.3390/s19030613. [24] O. Abbasi, A. Ebrahimi and N. Mokari, "NOMA Inspired Cooperative Relaying System Using an AF Relay," in IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 261-264, Feb. 2019, doi: 10.1109/LWC.2018.2869592. [25] H. Hashemi, "The indoor radio propagation channel," in Proceedings of the IEEE, vol. 81, no. 7, pp. 943-968, Jul. 1993, doi: 10.1109/5.231342. [26] A. Laourine, A. Stephenne and S. Affes, "On the capacity of log-normal fading channels," in IEEE Transactions on Communications, vol. 57, no. 6, pp. 1603-1607, Jun. 2009, doi: 10.1109/TCOMM.2009.06.070109. [27] H. Nouri, F. Touati and M. Uysal, "Diversity-Multiplexing Tradeoff for Log-Normal Fading Channels," in IEEE Transactions on Communications, vol. 64, no. 7, pp. 3119-3129, Jul. 2016, doi: 10.1109/TCOMM.2016.2575019. [28] K. M. Rabie, A. Salem, E. Alsusa and M. Alouini, "Energy-harvesting in cooperative AF relaying networks over log-normal fading channels," 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 2016, pp. 1-7, doi: 10.1109/ICC.2016.7511559. [29] K. M. Rabie, B. Adebisi and M. Alouini, "Half-Duplex and Full-Duplex AF and DF Relaying With Energy- Harvesting in Log-Normal Fading," in IEEE Transactions on Green Communications and Networking, vol. 1, no. 4, pp. 468-480, Dec. 2017, doi: 10.1109/TGCN.2017.2740258. [30] R. Katla and A. V. Babu, "Dual-hop full duplex relay networks over composite fading channels: Power and locationoptimization," Physical Communication, vol. 30, pp. 1-14, 2018, doi: 10.1016/j.phycom.2018.07.009. [31] Y. Liu, R. Xiao, J. Shen, and H. Yang, "Hybrid protocol for wireless energy harvesting network over log-normal fading channel," The Journal of Engineering, vol. 2018, no. 6, pp. 339-341, 2018, doi: 10.1049/joe.2017.0892.