SlideShare a Scribd company logo
1 of 21
Download to read offline
Received March 27, 2021, accepted April 14, 2021, date of publication April 20, 2021, date of current version April 29, 2021.
Digital Object Identifier 10.1109/ACCESS.2021.3074350
Deep Learning Empowered Semi-Blind Joint
Detection in Cooperative NOMA
AHMET EMIR 1, FERDI KARA 1,2, (Member, IEEE), HAKAN KAYA 1,
AND HALIM YANIKOMEROGLU 2, (Fellow, IEEE)
1Wireless Communication Technologies Laboratory (WCTLab), Department of Electrical and Electronics Engineering, Zonguldak Bülent Ecevit University,
Zonguldak 67100, Turkey
2Department of Systems and Computer Engineering, Carleton University, Ottawa, ON K1S 5B6, Canada
Corresponding author: Ferdi Kara (f.kara@beun.edu.tr)
ABSTRACT In this paper, we propose a multi-user symbol detection in cooperative-non-orthogonal multiple
access (C-NOMA) schemes via deep learning (DL). We use a DL-based detection (DLDet) in both users
instead of conventional detectors. Therefore, an iterative detector (i.e., successive interference canceler
(SIC)) at the near user (UE1) and a combining plus optimum detector (i.e., maximum ratio combining (MRC)
and maximum-likelihood (ML) detector) at the far user (UE2) are not required anymore. The proposed
DLDet can detect symbols at the both users simultaneously. Besides, the DLDet does not require an
additional channel estimation algorithm to acquire the channel state information (CSI) at the receivers.
The multi-user symbol detection is performed based on the received pilot responses simultaneously, thus
calling semi-blind. We train the proposed DLDet offline over Rayleigh fading channel and then, we use the
offline-trained DLDet as an online detection algorithm. We compare the error performance of the DLDet
with two benchmarks: conventional C-NOMA and threshold-based selective C-NOMA (TBS-C-NOMA).
With the extensive simulations over Rayleigh fading channels, we reveal that the DLDet outperforms both
C-NOMA and TBS-C-NOMA and achieves the full diversity order (i.e., 2). Besides, this performance gain
is up to ∼ 10 dB and ∼ 3 − 7 dB in C-NOMA and TBS-C-NOMA, respectively, which is very promising
for the energy-limited networks. Moreover, in order to improve the error performance of the C-NOMA,
the TBS-C-NOMA introduces two disadvantages, which are a signaling overhead to obtain the optimum
threshold value and a capacity performance decay due the silence of the relay when the threshold is not
satisfied. To this end, without using a threshold, outperforming TBS-C-NOMA is essential to revoke these
disadvantages. The DLDet accomplish this; hence, the power of the DLDet is unveiled in coping with
the error propagation. Then, to reveal the robustness of the DLDet against different fading conditions,
we use the offline-trained DLDet as an online detector over different fading channels (i.e., Nakagami-m
and Rician). We show that the DLDet outperforms conventional detectors over those fading channels and
again outperforms the conventional C-NOMA and TBS-C-NOMA performances, although it is trained over
Rayleigh fading channel. Indeed, the DLDet has better performance than the C-NOMA and TBS-C-NOMA
even though they are assumed to have perfect CSI whereas the DLDet uses only a single pilot signal. The
DLDet again provides the full diversity order (i.e., 2m for Nakagami-m and 2 for Rician). This proves the
robustness of the DLDet and shows that the DLDet performs well regardless of the fading conditions once
it is trained for any fading channel.
INDEX TERMS Cooperative NOMA, deep learning, error performance, joint symbol detection, semi-blind
detection.
I. INTRODUCTION
5G and beyond networks are keen to divided into
three main aspects/vertical sectors in terms of quality of
The associate editor coordinating the review of this manuscript and
approving it for publication was Cunhua Pan .
service criteria. These pioneer areas are grouped as: enhanced
mobile broadband communication (eMBC), ultra reliable low
latency communication (uRLLC) and massive machine-type
communication (mMTC) [1], [2]. All these aspects can not
be achieved by a single physical layer technique; hence,
the multiple access techniques will also diverse between
61832
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
VOLUME 9, 2021
A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA
these vertical sectors contrary to previous wireless genera-
tions where one ubiquitous technique covers all clients [3].
Non-orthogonal multiple access (NOMA)1 is one of the
key technologies for mMTC due to its high spectral effi-
ciency [3], [4]. Hence, NOMA has attracted tremendous
attention from the academia [5] and industry [6]. NOMA is
based on transmitting all users’ symbols on the same resource
block (time/frequency/code) with different power allocation
coefficients. Thus, all resource blocks are shared by users and
overall capacity is improved. The detection at the users is
succeeded by implementing iterative successive interference
cancelers (SIC) to eliminate intentionally created inter-user-
interference. In addition, the interplay between NOMA and
other physical layer techniques (e.g., cooperative communi-
cation, cognitive radio, MIMO, etc.) has been investigated
since NOMA has a flexibility to be implemented in other
techniques [7].
In cooperative-NOMA (C-NOMA), the users with the bet-
ter channel conditions act as relays for the users with poor
channel conditions and forward their symbols obtained dur-
ing SIC processes. The C-NOMA concept was firstly pro-
posed for short range communication in [8] and the authors
have proved the superiority of C-NOMA over conventional
NOMA and orthogonal multiple access (OMA) networks
in terms of achievable rate and outage probability. Then
in [9], the authors have analyzed the bit error probability
of C-NOMA and have showed that the error propagation
from near user to far user dominates the error performance
of network and the diversity can not be achieved, although a
cooperative communication is implemented. Then, to mini-
mize the effect of error propagation in C-NOMA networks,
the authors in [10] have proposed threshold-based selec-
tive cooperative-NOMA (TBS-C-NOMA) where the near
user forwards the far user’s symbols only if the received
signal-to-interference plus noise ratio (SINR) is above
pre-determined threshold value otherwise it remains silent in
the second phase of communication. Although the proposed
TBS-C-NOMA decreases the effect of error propagation
on C-NOMA, the system model is depended on the
pre-determined threshold value. The authors have also ana-
lyzed the optimum threshold value to minimize the error
performance of TBS-C-NOMA and derived an analytical
expression for it. This optimum threshold value is to be
used at the near user (relay) and to determine the optimum
threshold value, the near user requires extra information such
as channel state information (CSI) of far user and transmit
power. However, these cost a signaling overload. Besides,
there is a trade-off in TBS-C-NOMA that is: the capacity and
outage probability performances get worse in TBS-C-NOMA
whereas the error performance is increased [11]. Hence,
increasing the error performance of C-NOMA rather than
1Although, NOMA has divided into three main concept as: power domain
NOMA (PD-NOMA), code domain NOMA (CD-NOMA) and pattern divi-
sion multiple access (PDMA), we focus on PD-NOMA concept and use
NOMA abbreviation for PD-NOMA.
implementing TBS-C-NOMA seems more beneficial in
terms of all performance aspects.
On the other hand, machine learning techniques have
been investigated for decades for prediction, recognition and
classification applications. There have also been some studies
which investigate machine learning in physical layer commu-
nications [12]. Nevertheless, the implementation complex-
ity/cost made them impractical for physical communications
although it has taken an important role on the higher-level
algorithms. However, with the development in the digital
signal processors and the improvement of computational
capacity, machine learning techniques gain an important role
for physical layer communications. Deep learning (DL) is
seen as the milestone of machine learning techniques and
has great recent attention in communication applications.
The authors in [13] have built a DL network to estimate
channel and to detect orthogonal frequency division mul-
tiplexing (OFDM) symbols jointly. It is shown that using
DL networks for estimation and detection has performed
better than well-known estimation (least square -LS, min-
imum mean-square error -MMSE)/detection (maximum
likelihood-ML) algorithms. This study has proven the power
of DL networks for physical layer communications and has
led the researchers to investigate DL networks in physical
communications [14]–[16]. State-of-art for DL implemen-
tation in physical layer communication is drawn for both
data-driven and model-driven networks in [17]–[20] and the
potential of DL has been shown. Then, this high poten-
tial of DL networks has attracted great attention by the
community [21], [22] and the DL networks applications
have been implemented in more timely topics such as
index modulations [23] and mmWave communications [24].
Therefore, the DL-based algorithms have also been
implemented in NOMA schemes where grant-free and
multi-user detection are investigated in CD-NOMA [25]–[27]
and along with PD-NOMA schemes for classification/
optimization [28]–[30], resource allocation [31], [32], modu-
lation design [33], [34], signal detection [35]–[40]. However,
all aforementioned studies assume basic downlink and/or
uplink NOMA schemes and to the best of the authors’
knowledge, there is no study to design DL-aided joint signal
detection to improve the error performance of C-NOMA, yet.
Based on above discussions, in this paper, we propose
a data-driven DL network to detect users’ symbols jointly
in C-NOMA. The main contributions of this paper are sum-
marized as follow.
• We propose a DL-based detection (DLDet) in C-NOMA
where the proposed DLDet is able to detect both users’
symbols jointly at the near user without an iterative (suc-
cessive) detection. Hence, we eliminate the usage of
SIC process at the near user and this could provide
less latency. Besides, the DLDet performs a cooperative
detection at the far user without requiring a combining
technique.
• The DLDet performs the symbol detection based on the
received pilot responses; hence no additional channel
VOLUME 9, 2021 61833
A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA
estimation algorithm (e.g., LS, MMSE) is required at
both users, such that calling a semi-blind joint detection.
• Based on the extensive simulations over Rayleigh fad-
ing channels, the DLDet provides a better error per-
formance than conventional detectors in C-NOMA.
The effect of the error propagation is eliminated com-
pletely. The DLDet provides more than ∼ 10 dB gain
over C-NOMA which is superb for the energy-limited
networks. Indeed, the DLDet also outperforms the
TBS-C-NOMA even with optimum threshold usage up
to ∼ 2 − 6 dB. Moreover, these performance gains are
obtained when very low pilot sizes are used in DLDet
whereas the perfect CSI is assumed in C-NOMA and
TBS-C-NOMA. Therefore, not only the error perfor-
mance of the C-NOMA is improved but also the capacity
degradation has not been introduced due to the pilot
size. In addition, an additional signaling overhead is
not required to obtain the optimum threshold value to
increase the performance as being in TBS-C-NOMA.
• Furthermore, the DLDet outperforms conventional
detectors over different fading channels
(i.e., Nakagami-m and Rician), although it is trained
offline over Rayleigh fading channels. Besides,
the DLDet has better performance than conventional
C-NOMA and TBS-C-NOMA with the perfect CSI even
if only one pilot signal is used in the DLDet. The DLDet
achieves the full diversity order (i.e., 2 for Rayleigh and
Rician and 2m for Nakagami-m) regardless of the fading
conditions. This unveils the robustness of the DLDet
against fading conditions.
The remainder of this work is as follows. In Section II,
we introduce signal and channel models for the C-NOMA.
We have also presented benchmark detection for C-NOMA
and TBS-C-NOMA in this section. Then, in Section III,
we introduce the proposed DLDet: DL-based detection. The
model parameters and training details for the DLDet are
presented. In Section IV, we provide numerical results and
comparisons with the well-known detectors (SIC and ML)
are provided. Finally, Section V discusses the results and the
paper is concluded.
Notation: The normal font and lowercase letters
(i.e., y) represent complex scalar values. The bold uppercase
(i.e., Y) and lowercase (i.e., y) letters denote the matri-
ces and the vectors, respectively. Re{} and Im{} are the
operations for in-phase and quadrature components of a
scalar/vector/matrix; hence, we use (.)I and (.)Q for in-phase
and quadrature components of a scalar/vector/matrix. ˆ
denotes the estimated symbol/vector/matrix. (.)∗ is used for
conjugate of a complex scalar/vector. ||.|| is the Euclidean
norm of a matrix/vector. We use |.| for the absolute value
of a scalar/vector. In the representations, (x/x/X)λ,ψ , ψ =
p, d represents signals/responses in the λ link for ψ where
p refers to the pilot symbols/responses and d refers to the
data symbols/responses. CN(µ, σ2) is a complex Gaussian
distribution which has independent real and imaginary ran-
dom variables with the µ mean and the σ2
2 variance. Lastly,
P
(A,k)
i (e) denotes the error probability of the ith symbols at
the user k by implementing A detector.
II. SYSTEM AND CHANNEL MODELS
In C-NOMA, a downlink NOMA network is considered
where a base station (BS) and two mobile users are located
(i.e., UE1 and UE2). The users are denoted as the near
(intra-cell) user and far (cell-edge) user according to their
large-scale fading coefficients (e.g., distances to the BS).
As shown in Fig. 1, the intra-cell user also acts as a
half-duplex relay for cell-edge user and a cooperative phase
is implemented. The total communication covers two time
slots and in the first time slot, BS implements a conven-
tional NOMA by superimposing signals of the users. Thus,
the received signal by users in the first time slot are given as
yλ =
p
Pshλ(
√
a1x1 +
√
a2x2) + nλ, λ = s1, s2, (1)
FIGURE 1. The illustration of the considered system model.
where hλ and nλ denote the complex channel fading
coefficient and the additive white Gaussian noise (AWGN),
respectively. nλ is distributed as CN(0, N0). The chan-
nel coefficient between each node is assumed to follow2
CN(0, σ2
λ ), λ = s1, s2, r where s1, s2 and r denote the links
between BS-UE1, BS-UE2 and UE1-UE2, respectively, and
σ2
λ is related to the distance between nodes. a1 and a2 are
power allocation coefficients for the users’ baseband symbols
x1 and x2, respectively. Without loss of generality, UE1 and
UE2 are assumed to be intra-cell user and cell-edge user
according to distance to the BS i.e., σ2
s1 ≥ σ2
s2; thus, a1 < a2
is determined.
2E[|hλ|2]] = σ2
λ = µd−τ
λ is defined where µ, dλ, and τ are the
propagation constant, the Euclidean distance, and the path-loss exponent,
respectively. Nevertheless, we use σ2
λ for notation simplicity.
61834 VOLUME 9, 2021
A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA
A. C-NOMA
After detection of symbols at UE1, UE1 forwards the symbols
of UE2 in the second phase of communication (see Fig. 1.a).
Hence, the received signal by UE2 in the second phase of
C-NOMA is given as
yr =
p
Pr hr x̂
(1)
2 + nr , (2)
where Pr is the power of the relay-UE1- and hr is the fading
coefficient between users. x̂
(1)
2 denotes the detected symbols
of the UE2 at UE1.
B. TBS-C-NOMA
In TBS-C-NOMA, to minimize the effect of error propa-
gation from UE1 to UE2, the second phase of communi-
cation is succeeded only if the SINR at the UE1 is above
the pre-determined threshold value, otherwise UE1 remains
silent in the second phase of communication (see Fig. 1.b).
Hence, the received signal by UE2 in the second phase of
TBS-C-NOMA is given as
yr =
(
0, γ < γth,
√
Pr hr x̂
(1)
2 + nr , γ ≥ γth,
(3)
where, γth is the threshold value. γ denotes the SINR at
UE1 in the first phase for the symbols of UE2 and it is defined
as
γ =
ρsa2 |hs1|2
ρsa1 |hs1|2
+ 1
, (4)
where ρs = Ps/N0 is defined.
C. BENCHMARK DETECTORS IN C-NOMA AND
TBS-C-NOMA
In the first phase, since the both users’ symbols are con-
veyed simultaneously, an interference occurs. Therefore,
an interference mitigation technique is required. To this end,
the UE1 implements an SIC to detect its own symbols. The
UE1 firstly detects x2 symbols by pretending own symbols
(i.e., x1) as noise since x2 symbols have higher power alloca-
tion (i.e., a2 > a1). The maximum-likelihood (ML) detection
at the UE1 for x2 symbols is given as
x̂
(1)
2 = argmin
j
ys1 −
p
Psa2ĥ1x2,j
2
, j = 1, 2, . . . , M2,
(5)
where x2,j is the jth constellation point in M2-ary modulation
order of the UE2. ĥλ, λ = s1, s2, r is the estimated chan-
nel coefficient acquired by a channel estimation algorithm
(e.g., LS, MMSE). Then, the detected x̂
(1)
2 symbols are
subtracted from the received signal and an ML detector
is performed for x1 symbols. Thus, the detection structure
of x1 symbols is given by
x̂1 = argmin
j
y
(SIC)
s1 −
p
Psa1ĥ1x1,j
2
, j = 1, 2, . . . , M1,
(6)
where
y
(SIC)
s1 = ys1 −
p
Psa2ĥ1x̂
(1)
2 . (7)
On the other hand, a cooperative communication is consid-
ered for the UE2 and the UE2 receives two copies within two
time phases. Thus, as firstly, these copies are combined by
using maximum ratio combining (MRC). The total received
symbol at the UE2 after the MRC is given by
y2 = ys2ĥ∗
s2 + yr ĥ∗
r , (8)
where ()∗ is the conjugate operation. Lastly, to detect x̂2
symbols at the UE1, an ML detector (as being in (5)) is
implemented based on the obtained y2 signal.
III. THE PROPOSED DLDet
In the proposed model, we use a four-layered DL network
based on Long Short Term Memory (LSTM). The LSTM
networks perform well in predicting single or time-series
data and resolve the learning deficiency of long-term cor-
relation in conventional recurrent neural networks (RNNs).
As it will be discussed in detail in the next subsection,
in this paper, we perform a frame-based detection and within
the frame, the data is correlated due to the channel fading.
Besides, the pre-trained LSTM networks perform well in
different fading/channel environments as long as one of the
inputs includes an informative data belonging to that fad-
ing/channel condition (e.g., pilot responses). Thanks to our
frame design and representative inputs (will be explained in
the next subsection), the proposed DLDet could perform well
in not only the training channel conditions but also various
channel/fading conditions which have not been used in the
training. This advantage of the LSTM provides a robustness
design against fading environments and once the training is
completed, it can be used on different fading/channel environ-
ments. It is given by the LSTM inventors as: ‘‘Unlike previous
approaches, ours quickly learns to distinguish between two or
more widely separated occurrences of a particular element in
an input sequence, without depending on appropriate short
time lag training exemplars.’’ [41]. Therefore, we choose
the LSTM-based DL network thanks to its aforementioned
powers.3 Each layer of the proposed DLDet is explained as
follows.
• The first layer is the input layer where the inputs of
the network are transferred to the further layer with
weight coefficients likewise in simple artificial neural
networks (ANNs).
• In the next two layers, we implement two LSTM lay-
ers which have 30 and 10 LSTM cells, respectively.
3Nevertheless, we would like to note that other DL approaches (e.g., deep
neural networks (DNN), convolution neural networks (CNN), generative
adversarial networks (GAN), etc.) have also been used for symbol detection
of communications systems in the literature. The performances of the chosen
DL approaches are heavily based on dataset generation and the training.
Thus, no one can guarantee that one of the DL approaches outperforms
others unless the specific applications such reinforcement learning. Other
DL approaches could have also been tried for detection of C-NOMA, but it
is beyond the scope of this paper.
VOLUME 9, 2021 61835
A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA
FIGURE 2. The proposed DLDet networks.
As being in all previous data-driven communication
applications [25]–[40], the number of LSTM layers and
the number of LSTM cells in each layer are empiri-
cally determined, such that increasing the sizes do not
provide a noteworthy gain in learning performance and
the network performance converges. In an LSTM cell,
the output is produced by not only the current inputs but
also the previous cell status. To memorize the previous
status and decide whether the previous statuses are used
or not, the LSTM cell includes <gate units>. These are
the input gate, the candidate gate, the forget gate and the
output gate as seen in Fig. 2 and are explained briefly as
follow.
– The input gate collects the data from the pre-
vious layer and previous cells within the LSTM
layer.
– The candidate gate computes the new coefficient
based on the activation function (i.e., sigmoid func-
tion) and the forget gate status.
– The forget gate has knowledge how much the pre-
vious cell status will be used (e.g., 0 for forget, 1
for full usage and any value between 0 − 1 for the
usage to the some extent).
– Finally, at the output gate, the cell output is com-
puted according to cell input, candidate gate value
and activation function (for detailed analysis for an
LSTM cell, please refer to [41]).
• The last layer in the DLDet is a fully-connected layer
(i.e., ANN) and it computes the outputs of the network
with trained-weighs and biases.
On the other hand, we use a feedback regression layer in
the training to optimize the network weights, biases and cell
status.
A. FRAME DESIGN AND REPRESENTATION
In wireless communications, the fading channel has a domi-
nant effect on the performance of the systems. Thus, the CSI
at the receiver is required to implement signal detection
in all wireless systems. Likewise, the signal detection in
NOMA needs the CSI at the receiver as explained in
the Section II. C and a channel estimation algorithm
(e.g., LS, MMSE) should be implemented at the users
to acquire the CSI. On the other hand, the DL net-
works have potential to detect symbols without an addi-
tional channel estimation algorithm to acquire the CSI. The
signal detection can be performed simultaneously based
on the pilot responses [13]. Therefore, in order to per-
form a semi-blind multi-user signal detection, we insert
known-pilot symbols within the data frames. Based on these
pilot responses, the proposed DLDet learns the correlation
within the data and predicts the transmitted data symbols.
61836 VOLUME 9, 2021
A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA
To this end, the total pilot plus data frame of users at
the BS are given as
x1 =


xp, xp, . . . , xp
| {z }
Lp
, x1(Lp + 1), . . . , x1(L)
| {z }
Ld



| {z }
L
,
x2 =


xp, xp, . . . , xp
| {z }
Lp
, x2(Lp + 1), . . . , x2(L)
| {z }
Ld



| {z }
L
, (9)
where xp is the known-pilot symbol and xi(t), i = 1, 2,
t = Lp + 1, Lp + 2, . . . , L is the base-band symbol of the
ith user in the tth order within the frame. Lp, Ld and L denote
the number of pilot symbols, number of data symbols and
total frame size, respectively. The Lp pilot symbols could
be also interleaved within the frame. However, this does not
change the performance, thus giving in the beginning for the
representation simplicity.
We assume that all channels undergo a block-fading.4 The
channel coefficient within a frame is constant and change
from frame to frame. According to (1) and (9), the received
frames in the first phase are given as
yλ
=


yλ,p(1), yλ,p(2), . . . , yλ,p(Lp)
| {z }
Lp
, yλ(Lp + 1), . . . , yλ(L)
| {z }
Ld



| {z }
L
=
p
Pshλ
√
a1

xp, xp, . . . , xp, x1(Lp + 1), . . . , x1(L)

+
√
a2

xp, xp, . . . , xp, x2(Lp + 1), . . . , x2(L)

+ nλ,
(10)
where yλ,p(t), t = 1, 2, . . . , Lp and yλ(t), t =
Lp + 1, Lp + 2, . . . , L denote the received pilot responses
and data symbols in the tth order within frame at the
users. nλ is a random process where each sample has
an AWGN.
Based on the received ys1 frame, the proposed DLDet at the
UE1 detects x̂1 and x̂
(1)
2 symbols simultaneously. By the same
frame generation in the first phase, the detected x̂
(1)
2 symbols
are formed with the known-pilot symbols and the frame is
given as
x̂
(1)
2 =


xp, xp, . . . , xp
| {z }
Lp
x̂
(1)
2 (Lp + 1), . . . , x̂
(1)
2 (L)
| {z }
Ld



| {z }
L
, (11)
4The C-NOMA scheme is assumed in short-range communication [8].
Hence, this assumption is quite reasonable in a short-range communication.
where x̂
(1)
2 (t), t = Lp +1, Lp +2, . . . , L denotes the detected
x2 symbol in the tth order within the frame at the UE1 by
the implemented DLDet. Likewise the first phase, xp is the
known-pilot symbol.
Then, the detected x̂
(1)
2 symbols and pilot symbols are for-
warded to the UE2 in the second phase. Therefore, according
to (2) and (11), the received frame at the UE2 in the second
phase is given as
yr
=


yr,p(1), yr,p(2), . . . , yr,p(Lp)
| {z }
Lp
yr (Lp + 1), . . . , yr (L)
| {z }
Ld



| {z }
L
=
p
Pr hr
h
xp, xp, . . . , xp, x̂
(1)
2 (Lp + 1), . . . , x̂
(1)
2 (L)
i
+ nr ,
(12)
where nr is a random process where each sample has
an AWGN.
Finally, the proposed DLDet at UE2 detects x̂2 symbols
based on the received frames in two phases given by (10)
and (12), respectively.
B. DATASET GENERATION AND TRAINING DLDet FOR UE1
At the UE1, the detection should be implemented in the first
phase. Thus, the detection is performed based on the received
frame ys1 in the first phase in (10) so that ys1 is the input
of the DLDet. Nevertheless, within the received L-length ys1
frame, the data symbols cover only Ld length. The remaining
Lp-length pilot symbols are inserted to acquire channel
responses and these are non-informative symbols. We should
detect the informative x̂1 and x̂
(1)
2 symbols which are both
Ld -length. Thus, the outputs of the DLDet are x̂1 and x̂
(1)
2
symbols with Ld -length.
In the LSTM networks, the frame sizes of the inputs and
the outputs should be the same. To this end, we should
reform the received frame ys1 to have Ld length. Hence,
we split the received frame into two groups as pilot responses,
Lp-length ys1,p, and received data symbols, Ld -length ys1.
Then, to have the same size, we extend the pilot responses
by adding copies at the end of the frame until to have
Ld -length. These reformed pilot responses and received data
frames are the inputs of the DLDet. On the other hand,
the DL networks can not perform with complex numbers.
Thus, we take in-phase (i.e., ()I ) and quadrature (i.e., ()Q)
components of each variables as different inputs and outputs.
The illustration for the system model of the DLDet at the
UE1 is given in Fig. 2.a.
Based on above reforming steps, the inputs of the DLDet
at the UE1 are given in (13), as shown at the bottom of the
next page. The DLDet is expected to detect data frames. The
outputs of proposed DLDet are the in-phase and quadrature
components of the detected frames; therefore, the detected
VOLUME 9, 2021 61837
A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA
frames are obtained by
x̂1,d = x̂I
1,d + 1j ∗ x̂
Q
1,d
=

x̂1(Lp + 1), x̂1(Lp + 2), . . . , x̂1(L)

| {z }
Ld
,
x̂
(1)
2,d = x̂
(1),I
2,d + 1j ∗ x̂
(1),Q
2,d
=
h
x̂
(1)
2 (Lp + 1), x̂
(1)
2 (Lp + 2), . . . , x̂
(1)
2 (L)
i
| {z }
Ld
, (14)
where x̂I
1,d , x̂
Q
1,d , x̂
(1),I
2,d , and x̂
(1),Q
2,d are the outputs of the
DLDet at the UE1 as given in Fig. 2.a.
In order to make the DLDet learn better and cope with
various signal-to-noise ratio (SNR) values, we consider dif-
ferent SNR values where we define an SNR = [0 : 5 : 30]
vector and for each SNR values in this vector, the dataset is
re-obtained to train the network. In the dataset generation,
we assume all the average channel qualities are the same
(i.e., E[|hs1|2] = E[|hs2|2] = E[|hr |2] = 0 dB). The
dataset generation for the DLDet at the UE1 is given in
Algorithm 1 where S is the number of samples for each
scenario.
The outputs of Algorithm 1 are the users’ symbols, the pilot
responses and the received signals in the first phase. They are
given as matrices form and each rows of these matrices are the
Ld -length in-phase and quadrature components of the frames
obtained in Steps 5 and 8 of Algorithm 1. Hereby, it is worthy
noting that the transmitted xi,d , i = 1, 2 frames are included
in the dataset since they will be used as the target (desired)
outputs at the regression layer during the training process.
After obtaining the dataset, the DLDet is trained to detect
UE1 and UE2 symbols jointly. In the training process, it is
aimed to minimize the number of the erroneous-detected
symbols. Thus, the optimization problems for the DLDet at
Algorithm 1: Dataset Generation for DLDet at UE1
Data: S, L, Lp, Ld , SNR
1 for each SNR value in SNR do
2 for s = 1 : S do
3 IGenerate Lp-length xp known-pilot symbols.
4 IGenerate random Ld log2 Mi, i = 1, 2 bits for
UE1 and UE2 and obtain the Ld -length x1,d
and x2,d by mapping random bits to xi by
Mi-ary modulation.
5 IObtain the L-length xi, i = 1, 2 frames by
using (9).
6 IGenerate random Rayleigh channel
coefficients (hs1) and generate random AWGN
process (ns1).
7 IAccording to (10), calculate the ys1 with L
length and then based on this ys1, reform the
Ld -length yI
s1,p, y
Q
s1,p,yI
s1,d , y
Q
s1,d by using (13).
8 end
9 end
Result: XI
1,d ,X
Q
1,d ,XI
2,d ,X
Q
2,d ,YI
s1,p,Y
Q
s1,p,YI
s1,d ,Y
Q
s1,d
UE1 are given as
{P1} = min
(
1
2Ld
Ld
X
i=1
|x1,d − x̂1,d |

More Related Content

What's hot

An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...iosrjce
 
Iaetsd comparative study mimo ofdm, cdma-sdma
Iaetsd comparative study mimo ofdm, cdma-sdmaIaetsd comparative study mimo ofdm, cdma-sdma
Iaetsd comparative study mimo ofdm, cdma-sdmaIaetsd Iaetsd
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...IJCSEIT Journal
 
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networksszhb
 
ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM
ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEMANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM
ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEMIJARIIE JOURNAL
 
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
 
Thesis Report Muhammet Colak
Thesis Report Muhammet ColakThesis Report Muhammet Colak
Thesis Report Muhammet Colakmuhammet çolak
 
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK Modulation
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK ModulationPerformance Comparison of Multi-Carrier CDMA Using QPSK and BPSK Modulation
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK ModulationIOSR Journals
 
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...IJERA Editor
 
The performance of the vehicular communication-clustering process
The performance of the vehicular communication-clustering processThe performance of the vehicular communication-clustering process
The performance of the vehicular communication-clustering processTELKOMNIKA JOURNAL
 
MULTI USER DETECTOR IN CDMA USING ELLIPTIC CURVE CRYPTOGRAPHY
MULTI USER DETECTOR IN CDMA USING ELLIPTIC CURVE CRYPTOGRAPHYMULTI USER DETECTOR IN CDMA USING ELLIPTIC CURVE CRYPTOGRAPHY
MULTI USER DETECTOR IN CDMA USING ELLIPTIC CURVE CRYPTOGRAPHYVLSICS Design
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd Iaetsd
 
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksComparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksTELKOMNIKA JOURNAL
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 

What's hot (20)

Final project M.TECH ( PPT FILE )
Final project M.TECH ( PPT FILE )Final project M.TECH ( PPT FILE )
Final project M.TECH ( PPT FILE )
 
456 460
456 460456 460
456 460
 
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
 
Iaetsd comparative study mimo ofdm, cdma-sdma
Iaetsd comparative study mimo ofdm, cdma-sdmaIaetsd comparative study mimo ofdm, cdma-sdma
Iaetsd comparative study mimo ofdm, cdma-sdma
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
 
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
 
Os3425622565
Os3425622565Os3425622565
Os3425622565
 
ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM
ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEMANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM
ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM
 
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
 
Thesis Report Muhammet Colak
Thesis Report Muhammet ColakThesis Report Muhammet Colak
Thesis Report Muhammet Colak
 
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK Modulation
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK ModulationPerformance Comparison of Multi-Carrier CDMA Using QPSK and BPSK Modulation
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK Modulation
 
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
 
Iv2415471554
Iv2415471554Iv2415471554
Iv2415471554
 
The performance of the vehicular communication-clustering process
The performance of the vehicular communication-clustering processThe performance of the vehicular communication-clustering process
The performance of the vehicular communication-clustering process
 
Bo mim orelay
Bo mim orelayBo mim orelay
Bo mim orelay
 
MULTI USER DETECTOR IN CDMA USING ELLIPTIC CURVE CRYPTOGRAPHY
MULTI USER DETECTOR IN CDMA USING ELLIPTIC CURVE CRYPTOGRAPHYMULTI USER DETECTOR IN CDMA USING ELLIPTIC CURVE CRYPTOGRAPHY
MULTI USER DETECTOR IN CDMA USING ELLIPTIC CURVE CRYPTOGRAPHY
 
eaodv
eaodveaodv
eaodv
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by using
 
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksComparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 

Similar to Deep_Learning_Empowered_Semi-Blind_Joint_Detection_in_Cooperative_NOMA.pdf

Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...IJCNCJournal
 
PARTICLE SWARM OPTIMIZATION–LONG SHORTTERM MEMORY BASED CHANNEL ESTIMATION WI...
PARTICLE SWARM OPTIMIZATION–LONG SHORTTERM MEMORY BASED CHANNEL ESTIMATION WI...PARTICLE SWARM OPTIMIZATION–LONG SHORTTERM MEMORY BASED CHANNEL ESTIMATION WI...
PARTICLE SWARM OPTIMIZATION–LONG SHORTTERM MEMORY BASED CHANNEL ESTIMATION WI...IJCNCJournal
 
Enhancement of outage probability for down link cooperative non-orthogonal m...
Enhancement of outage probability for down link cooperative  non-orthogonal m...Enhancement of outage probability for down link cooperative  non-orthogonal m...
Enhancement of outage probability for down link cooperative non-orthogonal m...IJECEIAES
 
LTE Cellular Networks Packet Scheduling Algorithms in Downlink and Uplink Tra...
LTE Cellular Networks Packet Scheduling Algorithms in Downlink and Uplink Tra...LTE Cellular Networks Packet Scheduling Algorithms in Downlink and Uplink Tra...
LTE Cellular Networks Packet Scheduling Algorithms in Downlink and Uplink Tra...ijwmn
 
COMPARING VARIOUS CHANNEL ESTIMATION TECHNIQUES FOR OFDM SYSTEMS USING MATLAB
COMPARING VARIOUS CHANNEL ESTIMATION TECHNIQUES FOR OFDM SYSTEMS USING MATLABCOMPARING VARIOUS CHANNEL ESTIMATION TECHNIQUES FOR OFDM SYSTEMS USING MATLAB
COMPARING VARIOUS CHANNEL ESTIMATION TECHNIQUES FOR OFDM SYSTEMS USING MATLABijwmn
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...ijcnes
 
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...villagopi
 
Study on transmission over Nakagami-m fading channel for multiple access sche...
Study on transmission over Nakagami-m fading channel for multiple access sche...Study on transmission over Nakagami-m fading channel for multiple access sche...
Study on transmission over Nakagami-m fading channel for multiple access sche...TELKOMNIKA JOURNAL
 
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMA
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMACombination of iterative IA precoding and IBDFE based Equalizer for MC-CDMA
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMAEditor IJMTER
 
On the performance of non-orthogonal multiple access (NOMA) using FPGA
On the performance of non-orthogonal multiple access (NOMA) using FPGAOn the performance of non-orthogonal multiple access (NOMA) using FPGA
On the performance of non-orthogonal multiple access (NOMA) using FPGAIJECEIAES
 
Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...
Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...
Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...IRJET Journal
 
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...IOSR Journals
 
Multi User Detection in CDMA System Using Linear and Non Linear Detector
Multi User Detection in CDMA System Using Linear and Non Linear DetectorMulti User Detection in CDMA System Using Linear and Non Linear Detector
Multi User Detection in CDMA System Using Linear and Non Linear DetectorWaqas Tariq
 
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...IJCNCJournal
 
Iaetsd evaluation ofdma & sc-ofdma performance on
Iaetsd evaluation ofdma & sc-ofdma performance onIaetsd evaluation ofdma & sc-ofdma performance on
Iaetsd evaluation ofdma & sc-ofdma performance onIaetsd Iaetsd
 

Similar to Deep_Learning_Empowered_Semi-Blind_Joint_Detection_in_Cooperative_NOMA.pdf (20)

Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
 
PARTICLE SWARM OPTIMIZATION–LONG SHORTTERM MEMORY BASED CHANNEL ESTIMATION WI...
PARTICLE SWARM OPTIMIZATION–LONG SHORTTERM MEMORY BASED CHANNEL ESTIMATION WI...PARTICLE SWARM OPTIMIZATION–LONG SHORTTERM MEMORY BASED CHANNEL ESTIMATION WI...
PARTICLE SWARM OPTIMIZATION–LONG SHORTTERM MEMORY BASED CHANNEL ESTIMATION WI...
 
Enhancement of outage probability for down link cooperative non-orthogonal m...
Enhancement of outage probability for down link cooperative  non-orthogonal m...Enhancement of outage probability for down link cooperative  non-orthogonal m...
Enhancement of outage probability for down link cooperative non-orthogonal m...
 
NOMA.pdf
NOMA.pdfNOMA.pdf
NOMA.pdf
 
LTE Cellular Networks Packet Scheduling Algorithms in Downlink and Uplink Tra...
LTE Cellular Networks Packet Scheduling Algorithms in Downlink and Uplink Tra...LTE Cellular Networks Packet Scheduling Algorithms in Downlink and Uplink Tra...
LTE Cellular Networks Packet Scheduling Algorithms in Downlink and Uplink Tra...
 
COMPARING VARIOUS CHANNEL ESTIMATION TECHNIQUES FOR OFDM SYSTEMS USING MATLAB
COMPARING VARIOUS CHANNEL ESTIMATION TECHNIQUES FOR OFDM SYSTEMS USING MATLABCOMPARING VARIOUS CHANNEL ESTIMATION TECHNIQUES FOR OFDM SYSTEMS USING MATLAB
COMPARING VARIOUS CHANNEL ESTIMATION TECHNIQUES FOR OFDM SYSTEMS USING MATLAB
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 
D010231821
D010231821D010231821
D010231821
 
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
 
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
 
Study on transmission over Nakagami-m fading channel for multiple access sche...
Study on transmission over Nakagami-m fading channel for multiple access sche...Study on transmission over Nakagami-m fading channel for multiple access sche...
Study on transmission over Nakagami-m fading channel for multiple access sche...
 
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMA
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMACombination of iterative IA precoding and IBDFE based Equalizer for MC-CDMA
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMA
 
On the performance of non-orthogonal multiple access (NOMA) using FPGA
On the performance of non-orthogonal multiple access (NOMA) using FPGAOn the performance of non-orthogonal multiple access (NOMA) using FPGA
On the performance of non-orthogonal multiple access (NOMA) using FPGA
 
Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...
Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...
Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...
 
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...
 
Multi User Detection in CDMA System Using Linear and Non Linear Detector
Multi User Detection in CDMA System Using Linear and Non Linear DetectorMulti User Detection in CDMA System Using Linear and Non Linear Detector
Multi User Detection in CDMA System Using Linear and Non Linear Detector
 
SDSFLF: fault localization framework for optical communication using softwar...
SDSFLF: fault localization framework for optical  communication using softwar...SDSFLF: fault localization framework for optical  communication using softwar...
SDSFLF: fault localization framework for optical communication using softwar...
 
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
 
Iaetsd evaluation ofdma & sc-ofdma performance on
Iaetsd evaluation ofdma & sc-ofdma performance onIaetsd evaluation ofdma & sc-ofdma performance on
Iaetsd evaluation ofdma & sc-ofdma performance on
 
6 chapter 1,2,3,4,5 (15%) M.TECH ( M S WORD FILE )
6 chapter 1,2,3,4,5 (15%) M.TECH ( M S WORD FILE )6 chapter 1,2,3,4,5 (15%) M.TECH ( M S WORD FILE )
6 chapter 1,2,3,4,5 (15%) M.TECH ( M S WORD FILE )
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 

Deep_Learning_Empowered_Semi-Blind_Joint_Detection_in_Cooperative_NOMA.pdf

  • 1. Received March 27, 2021, accepted April 14, 2021, date of publication April 20, 2021, date of current version April 29, 2021. Digital Object Identifier 10.1109/ACCESS.2021.3074350 Deep Learning Empowered Semi-Blind Joint Detection in Cooperative NOMA AHMET EMIR 1, FERDI KARA 1,2, (Member, IEEE), HAKAN KAYA 1, AND HALIM YANIKOMEROGLU 2, (Fellow, IEEE) 1Wireless Communication Technologies Laboratory (WCTLab), Department of Electrical and Electronics Engineering, Zonguldak Bülent Ecevit University, Zonguldak 67100, Turkey 2Department of Systems and Computer Engineering, Carleton University, Ottawa, ON K1S 5B6, Canada Corresponding author: Ferdi Kara (f.kara@beun.edu.tr) ABSTRACT In this paper, we propose a multi-user symbol detection in cooperative-non-orthogonal multiple access (C-NOMA) schemes via deep learning (DL). We use a DL-based detection (DLDet) in both users instead of conventional detectors. Therefore, an iterative detector (i.e., successive interference canceler (SIC)) at the near user (UE1) and a combining plus optimum detector (i.e., maximum ratio combining (MRC) and maximum-likelihood (ML) detector) at the far user (UE2) are not required anymore. The proposed DLDet can detect symbols at the both users simultaneously. Besides, the DLDet does not require an additional channel estimation algorithm to acquire the channel state information (CSI) at the receivers. The multi-user symbol detection is performed based on the received pilot responses simultaneously, thus calling semi-blind. We train the proposed DLDet offline over Rayleigh fading channel and then, we use the offline-trained DLDet as an online detection algorithm. We compare the error performance of the DLDet with two benchmarks: conventional C-NOMA and threshold-based selective C-NOMA (TBS-C-NOMA). With the extensive simulations over Rayleigh fading channels, we reveal that the DLDet outperforms both C-NOMA and TBS-C-NOMA and achieves the full diversity order (i.e., 2). Besides, this performance gain is up to ∼ 10 dB and ∼ 3 − 7 dB in C-NOMA and TBS-C-NOMA, respectively, which is very promising for the energy-limited networks. Moreover, in order to improve the error performance of the C-NOMA, the TBS-C-NOMA introduces two disadvantages, which are a signaling overhead to obtain the optimum threshold value and a capacity performance decay due the silence of the relay when the threshold is not satisfied. To this end, without using a threshold, outperforming TBS-C-NOMA is essential to revoke these disadvantages. The DLDet accomplish this; hence, the power of the DLDet is unveiled in coping with the error propagation. Then, to reveal the robustness of the DLDet against different fading conditions, we use the offline-trained DLDet as an online detector over different fading channels (i.e., Nakagami-m and Rician). We show that the DLDet outperforms conventional detectors over those fading channels and again outperforms the conventional C-NOMA and TBS-C-NOMA performances, although it is trained over Rayleigh fading channel. Indeed, the DLDet has better performance than the C-NOMA and TBS-C-NOMA even though they are assumed to have perfect CSI whereas the DLDet uses only a single pilot signal. The DLDet again provides the full diversity order (i.e., 2m for Nakagami-m and 2 for Rician). This proves the robustness of the DLDet and shows that the DLDet performs well regardless of the fading conditions once it is trained for any fading channel. INDEX TERMS Cooperative NOMA, deep learning, error performance, joint symbol detection, semi-blind detection. I. INTRODUCTION 5G and beyond networks are keen to divided into three main aspects/vertical sectors in terms of quality of The associate editor coordinating the review of this manuscript and approving it for publication was Cunhua Pan . service criteria. These pioneer areas are grouped as: enhanced mobile broadband communication (eMBC), ultra reliable low latency communication (uRLLC) and massive machine-type communication (mMTC) [1], [2]. All these aspects can not be achieved by a single physical layer technique; hence, the multiple access techniques will also diverse between 61832 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ VOLUME 9, 2021
  • 2. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA these vertical sectors contrary to previous wireless genera- tions where one ubiquitous technique covers all clients [3]. Non-orthogonal multiple access (NOMA)1 is one of the key technologies for mMTC due to its high spectral effi- ciency [3], [4]. Hence, NOMA has attracted tremendous attention from the academia [5] and industry [6]. NOMA is based on transmitting all users’ symbols on the same resource block (time/frequency/code) with different power allocation coefficients. Thus, all resource blocks are shared by users and overall capacity is improved. The detection at the users is succeeded by implementing iterative successive interference cancelers (SIC) to eliminate intentionally created inter-user- interference. In addition, the interplay between NOMA and other physical layer techniques (e.g., cooperative communi- cation, cognitive radio, MIMO, etc.) has been investigated since NOMA has a flexibility to be implemented in other techniques [7]. In cooperative-NOMA (C-NOMA), the users with the bet- ter channel conditions act as relays for the users with poor channel conditions and forward their symbols obtained dur- ing SIC processes. The C-NOMA concept was firstly pro- posed for short range communication in [8] and the authors have proved the superiority of C-NOMA over conventional NOMA and orthogonal multiple access (OMA) networks in terms of achievable rate and outage probability. Then in [9], the authors have analyzed the bit error probability of C-NOMA and have showed that the error propagation from near user to far user dominates the error performance of network and the diversity can not be achieved, although a cooperative communication is implemented. Then, to mini- mize the effect of error propagation in C-NOMA networks, the authors in [10] have proposed threshold-based selec- tive cooperative-NOMA (TBS-C-NOMA) where the near user forwards the far user’s symbols only if the received signal-to-interference plus noise ratio (SINR) is above pre-determined threshold value otherwise it remains silent in the second phase of communication. Although the proposed TBS-C-NOMA decreases the effect of error propagation on C-NOMA, the system model is depended on the pre-determined threshold value. The authors have also ana- lyzed the optimum threshold value to minimize the error performance of TBS-C-NOMA and derived an analytical expression for it. This optimum threshold value is to be used at the near user (relay) and to determine the optimum threshold value, the near user requires extra information such as channel state information (CSI) of far user and transmit power. However, these cost a signaling overload. Besides, there is a trade-off in TBS-C-NOMA that is: the capacity and outage probability performances get worse in TBS-C-NOMA whereas the error performance is increased [11]. Hence, increasing the error performance of C-NOMA rather than 1Although, NOMA has divided into three main concept as: power domain NOMA (PD-NOMA), code domain NOMA (CD-NOMA) and pattern divi- sion multiple access (PDMA), we focus on PD-NOMA concept and use NOMA abbreviation for PD-NOMA. implementing TBS-C-NOMA seems more beneficial in terms of all performance aspects. On the other hand, machine learning techniques have been investigated for decades for prediction, recognition and classification applications. There have also been some studies which investigate machine learning in physical layer commu- nications [12]. Nevertheless, the implementation complex- ity/cost made them impractical for physical communications although it has taken an important role on the higher-level algorithms. However, with the development in the digital signal processors and the improvement of computational capacity, machine learning techniques gain an important role for physical layer communications. Deep learning (DL) is seen as the milestone of machine learning techniques and has great recent attention in communication applications. The authors in [13] have built a DL network to estimate channel and to detect orthogonal frequency division mul- tiplexing (OFDM) symbols jointly. It is shown that using DL networks for estimation and detection has performed better than well-known estimation (least square -LS, min- imum mean-square error -MMSE)/detection (maximum likelihood-ML) algorithms. This study has proven the power of DL networks for physical layer communications and has led the researchers to investigate DL networks in physical communications [14]–[16]. State-of-art for DL implemen- tation in physical layer communication is drawn for both data-driven and model-driven networks in [17]–[20] and the potential of DL has been shown. Then, this high poten- tial of DL networks has attracted great attention by the community [21], [22] and the DL networks applications have been implemented in more timely topics such as index modulations [23] and mmWave communications [24]. Therefore, the DL-based algorithms have also been implemented in NOMA schemes where grant-free and multi-user detection are investigated in CD-NOMA [25]–[27] and along with PD-NOMA schemes for classification/ optimization [28]–[30], resource allocation [31], [32], modu- lation design [33], [34], signal detection [35]–[40]. However, all aforementioned studies assume basic downlink and/or uplink NOMA schemes and to the best of the authors’ knowledge, there is no study to design DL-aided joint signal detection to improve the error performance of C-NOMA, yet. Based on above discussions, in this paper, we propose a data-driven DL network to detect users’ symbols jointly in C-NOMA. The main contributions of this paper are sum- marized as follow. • We propose a DL-based detection (DLDet) in C-NOMA where the proposed DLDet is able to detect both users’ symbols jointly at the near user without an iterative (suc- cessive) detection. Hence, we eliminate the usage of SIC process at the near user and this could provide less latency. Besides, the DLDet performs a cooperative detection at the far user without requiring a combining technique. • The DLDet performs the symbol detection based on the received pilot responses; hence no additional channel VOLUME 9, 2021 61833
  • 3. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA estimation algorithm (e.g., LS, MMSE) is required at both users, such that calling a semi-blind joint detection. • Based on the extensive simulations over Rayleigh fad- ing channels, the DLDet provides a better error per- formance than conventional detectors in C-NOMA. The effect of the error propagation is eliminated com- pletely. The DLDet provides more than ∼ 10 dB gain over C-NOMA which is superb for the energy-limited networks. Indeed, the DLDet also outperforms the TBS-C-NOMA even with optimum threshold usage up to ∼ 2 − 6 dB. Moreover, these performance gains are obtained when very low pilot sizes are used in DLDet whereas the perfect CSI is assumed in C-NOMA and TBS-C-NOMA. Therefore, not only the error perfor- mance of the C-NOMA is improved but also the capacity degradation has not been introduced due to the pilot size. In addition, an additional signaling overhead is not required to obtain the optimum threshold value to increase the performance as being in TBS-C-NOMA. • Furthermore, the DLDet outperforms conventional detectors over different fading channels (i.e., Nakagami-m and Rician), although it is trained offline over Rayleigh fading channels. Besides, the DLDet has better performance than conventional C-NOMA and TBS-C-NOMA with the perfect CSI even if only one pilot signal is used in the DLDet. The DLDet achieves the full diversity order (i.e., 2 for Rayleigh and Rician and 2m for Nakagami-m) regardless of the fading conditions. This unveils the robustness of the DLDet against fading conditions. The remainder of this work is as follows. In Section II, we introduce signal and channel models for the C-NOMA. We have also presented benchmark detection for C-NOMA and TBS-C-NOMA in this section. Then, in Section III, we introduce the proposed DLDet: DL-based detection. The model parameters and training details for the DLDet are presented. In Section IV, we provide numerical results and comparisons with the well-known detectors (SIC and ML) are provided. Finally, Section V discusses the results and the paper is concluded. Notation: The normal font and lowercase letters (i.e., y) represent complex scalar values. The bold uppercase (i.e., Y) and lowercase (i.e., y) letters denote the matri- ces and the vectors, respectively. Re{} and Im{} are the operations for in-phase and quadrature components of a scalar/vector/matrix; hence, we use (.)I and (.)Q for in-phase and quadrature components of a scalar/vector/matrix. ˆ denotes the estimated symbol/vector/matrix. (.)∗ is used for conjugate of a complex scalar/vector. ||.|| is the Euclidean norm of a matrix/vector. We use |.| for the absolute value of a scalar/vector. In the representations, (x/x/X)λ,ψ , ψ = p, d represents signals/responses in the λ link for ψ where p refers to the pilot symbols/responses and d refers to the data symbols/responses. CN(µ, σ2) is a complex Gaussian distribution which has independent real and imaginary ran- dom variables with the µ mean and the σ2 2 variance. Lastly, P (A,k) i (e) denotes the error probability of the ith symbols at the user k by implementing A detector. II. SYSTEM AND CHANNEL MODELS In C-NOMA, a downlink NOMA network is considered where a base station (BS) and two mobile users are located (i.e., UE1 and UE2). The users are denoted as the near (intra-cell) user and far (cell-edge) user according to their large-scale fading coefficients (e.g., distances to the BS). As shown in Fig. 1, the intra-cell user also acts as a half-duplex relay for cell-edge user and a cooperative phase is implemented. The total communication covers two time slots and in the first time slot, BS implements a conven- tional NOMA by superimposing signals of the users. Thus, the received signal by users in the first time slot are given as yλ = p Pshλ( √ a1x1 + √ a2x2) + nλ, λ = s1, s2, (1) FIGURE 1. The illustration of the considered system model. where hλ and nλ denote the complex channel fading coefficient and the additive white Gaussian noise (AWGN), respectively. nλ is distributed as CN(0, N0). The chan- nel coefficient between each node is assumed to follow2 CN(0, σ2 λ ), λ = s1, s2, r where s1, s2 and r denote the links between BS-UE1, BS-UE2 and UE1-UE2, respectively, and σ2 λ is related to the distance between nodes. a1 and a2 are power allocation coefficients for the users’ baseband symbols x1 and x2, respectively. Without loss of generality, UE1 and UE2 are assumed to be intra-cell user and cell-edge user according to distance to the BS i.e., σ2 s1 ≥ σ2 s2; thus, a1 < a2 is determined. 2E[|hλ|2]] = σ2 λ = µd−τ λ is defined where µ, dλ, and τ are the propagation constant, the Euclidean distance, and the path-loss exponent, respectively. Nevertheless, we use σ2 λ for notation simplicity. 61834 VOLUME 9, 2021
  • 4. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA A. C-NOMA After detection of symbols at UE1, UE1 forwards the symbols of UE2 in the second phase of communication (see Fig. 1.a). Hence, the received signal by UE2 in the second phase of C-NOMA is given as yr = p Pr hr x̂ (1) 2 + nr , (2) where Pr is the power of the relay-UE1- and hr is the fading coefficient between users. x̂ (1) 2 denotes the detected symbols of the UE2 at UE1. B. TBS-C-NOMA In TBS-C-NOMA, to minimize the effect of error propa- gation from UE1 to UE2, the second phase of communi- cation is succeeded only if the SINR at the UE1 is above the pre-determined threshold value, otherwise UE1 remains silent in the second phase of communication (see Fig. 1.b). Hence, the received signal by UE2 in the second phase of TBS-C-NOMA is given as yr = ( 0, γ < γth, √ Pr hr x̂ (1) 2 + nr , γ ≥ γth, (3) where, γth is the threshold value. γ denotes the SINR at UE1 in the first phase for the symbols of UE2 and it is defined as γ = ρsa2 |hs1|2 ρsa1 |hs1|2 + 1 , (4) where ρs = Ps/N0 is defined. C. BENCHMARK DETECTORS IN C-NOMA AND TBS-C-NOMA In the first phase, since the both users’ symbols are con- veyed simultaneously, an interference occurs. Therefore, an interference mitigation technique is required. To this end, the UE1 implements an SIC to detect its own symbols. The UE1 firstly detects x2 symbols by pretending own symbols (i.e., x1) as noise since x2 symbols have higher power alloca- tion (i.e., a2 > a1). The maximum-likelihood (ML) detection at the UE1 for x2 symbols is given as x̂ (1) 2 = argmin j
  • 5.
  • 6.
  • 8.
  • 9.
  • 10. 2 , j = 1, 2, . . . , M2, (5) where x2,j is the jth constellation point in M2-ary modulation order of the UE2. ĥλ, λ = s1, s2, r is the estimated chan- nel coefficient acquired by a channel estimation algorithm (e.g., LS, MMSE). Then, the detected x̂ (1) 2 symbols are subtracted from the received signal and an ML detector is performed for x1 symbols. Thus, the detection structure of x1 symbols is given by x̂1 = argmin j
  • 11.
  • 12.
  • 14.
  • 15.
  • 16. 2 , j = 1, 2, . . . , M1, (6) where y (SIC) s1 = ys1 − p Psa2ĥ1x̂ (1) 2 . (7) On the other hand, a cooperative communication is consid- ered for the UE2 and the UE2 receives two copies within two time phases. Thus, as firstly, these copies are combined by using maximum ratio combining (MRC). The total received symbol at the UE2 after the MRC is given by y2 = ys2ĥ∗ s2 + yr ĥ∗ r , (8) where ()∗ is the conjugate operation. Lastly, to detect x̂2 symbols at the UE1, an ML detector (as being in (5)) is implemented based on the obtained y2 signal. III. THE PROPOSED DLDet In the proposed model, we use a four-layered DL network based on Long Short Term Memory (LSTM). The LSTM networks perform well in predicting single or time-series data and resolve the learning deficiency of long-term cor- relation in conventional recurrent neural networks (RNNs). As it will be discussed in detail in the next subsection, in this paper, we perform a frame-based detection and within the frame, the data is correlated due to the channel fading. Besides, the pre-trained LSTM networks perform well in different fading/channel environments as long as one of the inputs includes an informative data belonging to that fad- ing/channel condition (e.g., pilot responses). Thanks to our frame design and representative inputs (will be explained in the next subsection), the proposed DLDet could perform well in not only the training channel conditions but also various channel/fading conditions which have not been used in the training. This advantage of the LSTM provides a robustness design against fading environments and once the training is completed, it can be used on different fading/channel environ- ments. It is given by the LSTM inventors as: ‘‘Unlike previous approaches, ours quickly learns to distinguish between two or more widely separated occurrences of a particular element in an input sequence, without depending on appropriate short time lag training exemplars.’’ [41]. Therefore, we choose the LSTM-based DL network thanks to its aforementioned powers.3 Each layer of the proposed DLDet is explained as follows. • The first layer is the input layer where the inputs of the network are transferred to the further layer with weight coefficients likewise in simple artificial neural networks (ANNs). • In the next two layers, we implement two LSTM lay- ers which have 30 and 10 LSTM cells, respectively. 3Nevertheless, we would like to note that other DL approaches (e.g., deep neural networks (DNN), convolution neural networks (CNN), generative adversarial networks (GAN), etc.) have also been used for symbol detection of communications systems in the literature. The performances of the chosen DL approaches are heavily based on dataset generation and the training. Thus, no one can guarantee that one of the DL approaches outperforms others unless the specific applications such reinforcement learning. Other DL approaches could have also been tried for detection of C-NOMA, but it is beyond the scope of this paper. VOLUME 9, 2021 61835
  • 17. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA FIGURE 2. The proposed DLDet networks. As being in all previous data-driven communication applications [25]–[40], the number of LSTM layers and the number of LSTM cells in each layer are empiri- cally determined, such that increasing the sizes do not provide a noteworthy gain in learning performance and the network performance converges. In an LSTM cell, the output is produced by not only the current inputs but also the previous cell status. To memorize the previous status and decide whether the previous statuses are used or not, the LSTM cell includes <gate units>. These are the input gate, the candidate gate, the forget gate and the output gate as seen in Fig. 2 and are explained briefly as follow. – The input gate collects the data from the pre- vious layer and previous cells within the LSTM layer. – The candidate gate computes the new coefficient based on the activation function (i.e., sigmoid func- tion) and the forget gate status. – The forget gate has knowledge how much the pre- vious cell status will be used (e.g., 0 for forget, 1 for full usage and any value between 0 − 1 for the usage to the some extent). – Finally, at the output gate, the cell output is com- puted according to cell input, candidate gate value and activation function (for detailed analysis for an LSTM cell, please refer to [41]). • The last layer in the DLDet is a fully-connected layer (i.e., ANN) and it computes the outputs of the network with trained-weighs and biases. On the other hand, we use a feedback regression layer in the training to optimize the network weights, biases and cell status. A. FRAME DESIGN AND REPRESENTATION In wireless communications, the fading channel has a domi- nant effect on the performance of the systems. Thus, the CSI at the receiver is required to implement signal detection in all wireless systems. Likewise, the signal detection in NOMA needs the CSI at the receiver as explained in the Section II. C and a channel estimation algorithm (e.g., LS, MMSE) should be implemented at the users to acquire the CSI. On the other hand, the DL net- works have potential to detect symbols without an addi- tional channel estimation algorithm to acquire the CSI. The signal detection can be performed simultaneously based on the pilot responses [13]. Therefore, in order to per- form a semi-blind multi-user signal detection, we insert known-pilot symbols within the data frames. Based on these pilot responses, the proposed DLDet learns the correlation within the data and predicts the transmitted data symbols. 61836 VOLUME 9, 2021
  • 18. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA To this end, the total pilot plus data frame of users at the BS are given as x1 =   xp, xp, . . . , xp | {z } Lp , x1(Lp + 1), . . . , x1(L) | {z } Ld    | {z } L , x2 =   xp, xp, . . . , xp | {z } Lp , x2(Lp + 1), . . . , x2(L) | {z } Ld    | {z } L , (9) where xp is the known-pilot symbol and xi(t), i = 1, 2, t = Lp + 1, Lp + 2, . . . , L is the base-band symbol of the ith user in the tth order within the frame. Lp, Ld and L denote the number of pilot symbols, number of data symbols and total frame size, respectively. The Lp pilot symbols could be also interleaved within the frame. However, this does not change the performance, thus giving in the beginning for the representation simplicity. We assume that all channels undergo a block-fading.4 The channel coefficient within a frame is constant and change from frame to frame. According to (1) and (9), the received frames in the first phase are given as yλ =   yλ,p(1), yλ,p(2), . . . , yλ,p(Lp) | {z } Lp , yλ(Lp + 1), . . . , yλ(L) | {z } Ld    | {z } L = p Pshλ √ a1 xp, xp, . . . , xp, x1(Lp + 1), . . . , x1(L) + √ a2 xp, xp, . . . , xp, x2(Lp + 1), . . . , x2(L) + nλ, (10) where yλ,p(t), t = 1, 2, . . . , Lp and yλ(t), t = Lp + 1, Lp + 2, . . . , L denote the received pilot responses and data symbols in the tth order within frame at the users. nλ is a random process where each sample has an AWGN. Based on the received ys1 frame, the proposed DLDet at the UE1 detects x̂1 and x̂ (1) 2 symbols simultaneously. By the same frame generation in the first phase, the detected x̂ (1) 2 symbols are formed with the known-pilot symbols and the frame is given as x̂ (1) 2 =   xp, xp, . . . , xp | {z } Lp x̂ (1) 2 (Lp + 1), . . . , x̂ (1) 2 (L) | {z } Ld    | {z } L , (11) 4The C-NOMA scheme is assumed in short-range communication [8]. Hence, this assumption is quite reasonable in a short-range communication. where x̂ (1) 2 (t), t = Lp +1, Lp +2, . . . , L denotes the detected x2 symbol in the tth order within the frame at the UE1 by the implemented DLDet. Likewise the first phase, xp is the known-pilot symbol. Then, the detected x̂ (1) 2 symbols and pilot symbols are for- warded to the UE2 in the second phase. Therefore, according to (2) and (11), the received frame at the UE2 in the second phase is given as yr =   yr,p(1), yr,p(2), . . . , yr,p(Lp) | {z } Lp yr (Lp + 1), . . . , yr (L) | {z } Ld    | {z } L = p Pr hr h xp, xp, . . . , xp, x̂ (1) 2 (Lp + 1), . . . , x̂ (1) 2 (L) i + nr , (12) where nr is a random process where each sample has an AWGN. Finally, the proposed DLDet at UE2 detects x̂2 symbols based on the received frames in two phases given by (10) and (12), respectively. B. DATASET GENERATION AND TRAINING DLDet FOR UE1 At the UE1, the detection should be implemented in the first phase. Thus, the detection is performed based on the received frame ys1 in the first phase in (10) so that ys1 is the input of the DLDet. Nevertheless, within the received L-length ys1 frame, the data symbols cover only Ld length. The remaining Lp-length pilot symbols are inserted to acquire channel responses and these are non-informative symbols. We should detect the informative x̂1 and x̂ (1) 2 symbols which are both Ld -length. Thus, the outputs of the DLDet are x̂1 and x̂ (1) 2 symbols with Ld -length. In the LSTM networks, the frame sizes of the inputs and the outputs should be the same. To this end, we should reform the received frame ys1 to have Ld length. Hence, we split the received frame into two groups as pilot responses, Lp-length ys1,p, and received data symbols, Ld -length ys1. Then, to have the same size, we extend the pilot responses by adding copies at the end of the frame until to have Ld -length. These reformed pilot responses and received data frames are the inputs of the DLDet. On the other hand, the DL networks can not perform with complex numbers. Thus, we take in-phase (i.e., ()I ) and quadrature (i.e., ()Q) components of each variables as different inputs and outputs. The illustration for the system model of the DLDet at the UE1 is given in Fig. 2.a. Based on above reforming steps, the inputs of the DLDet at the UE1 are given in (13), as shown at the bottom of the next page. The DLDet is expected to detect data frames. The outputs of proposed DLDet are the in-phase and quadrature components of the detected frames; therefore, the detected VOLUME 9, 2021 61837
  • 19. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA frames are obtained by x̂1,d = x̂I 1,d + 1j ∗ x̂ Q 1,d = x̂1(Lp + 1), x̂1(Lp + 2), . . . , x̂1(L) | {z } Ld , x̂ (1) 2,d = x̂ (1),I 2,d + 1j ∗ x̂ (1),Q 2,d = h x̂ (1) 2 (Lp + 1), x̂ (1) 2 (Lp + 2), . . . , x̂ (1) 2 (L) i | {z } Ld , (14) where x̂I 1,d , x̂ Q 1,d , x̂ (1),I 2,d , and x̂ (1),Q 2,d are the outputs of the DLDet at the UE1 as given in Fig. 2.a. In order to make the DLDet learn better and cope with various signal-to-noise ratio (SNR) values, we consider dif- ferent SNR values where we define an SNR = [0 : 5 : 30] vector and for each SNR values in this vector, the dataset is re-obtained to train the network. In the dataset generation, we assume all the average channel qualities are the same (i.e., E[|hs1|2] = E[|hs2|2] = E[|hr |2] = 0 dB). The dataset generation for the DLDet at the UE1 is given in Algorithm 1 where S is the number of samples for each scenario. The outputs of Algorithm 1 are the users’ symbols, the pilot responses and the received signals in the first phase. They are given as matrices form and each rows of these matrices are the Ld -length in-phase and quadrature components of the frames obtained in Steps 5 and 8 of Algorithm 1. Hereby, it is worthy noting that the transmitted xi,d , i = 1, 2 frames are included in the dataset since they will be used as the target (desired) outputs at the regression layer during the training process. After obtaining the dataset, the DLDet is trained to detect UE1 and UE2 symbols jointly. In the training process, it is aimed to minimize the number of the erroneous-detected symbols. Thus, the optimization problems for the DLDet at Algorithm 1: Dataset Generation for DLDet at UE1 Data: S, L, Lp, Ld , SNR 1 for each SNR value in SNR do 2 for s = 1 : S do 3 IGenerate Lp-length xp known-pilot symbols. 4 IGenerate random Ld log2 Mi, i = 1, 2 bits for UE1 and UE2 and obtain the Ld -length x1,d and x2,d by mapping random bits to xi by Mi-ary modulation. 5 IObtain the L-length xi, i = 1, 2 frames by using (9). 6 IGenerate random Rayleigh channel coefficients (hs1) and generate random AWGN process (ns1). 7 IAccording to (10), calculate the ys1 with L length and then based on this ys1, reform the Ld -length yI s1,p, y Q s1,p,yI s1,d , y Q s1,d by using (13). 8 end 9 end Result: XI 1,d ,X Q 1,d ,XI 2,d ,X Q 2,d ,YI s1,p,Y Q s1,p,YI s1,d ,Y Q s1,d UE1 are given as {P1} = min ( 1 2Ld Ld X i=1
  • 20.
  • 22.
  • 23. 2 ) , (15) and {P2} = min ( 1 2Ld Ld X i=1
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. 2 ) . (16) On the other hand, if the proposed DLDet can not reach the performance of the conventional C-NOMA and/or TBS-C-NOMA, it makes no sense. To this end, we also define yI s1,p = Re                    ys1,p(1), .., ys1,p(Lp) | {z } Lp , . . . , ys1,p(1), . . . , ys1,p(Lp) | {z } Lp    | {z } Ld                  , yI s1,d = Re      ys1,d (Lp + 1), ys1,d (Lp + 2), . . . , ys1,d (L) | {z } Ld      , y Q s1,p = Im                    ys1,p(1), . . . , ys1,p(Lp) | {z } Lp , . . . , ys1,p(1), . . . , ys1,p(Lp) | {z } Lp    | {z } Ld                  , y Q s1,d = Im      ys1,d (Lp + 1), ys1,d (Lp + 2), . . . , ys1,d (L) | {z } Ld      . (13) 61838 VOLUME 9, 2021
  • 36. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA two optimization problems as {P3} = min n P (DLDet) 1 (e) − P (SIC) 1 (e) o , (17) and {P4} = min n P (DLDet,1) 2 (e) − P (ML,1) 2 (e) o , (18) where P (DLDet) 1 (e) and P (DLDet,1) 2 (e) denote the bit error rate (BER) performances of the DLDet in detecting UE1 and UE2 symbols at the UE1 when it is implemented as a detector in C-NOMA. On the other hand, P (SIC) 1 (e) and P (ML,1) 2 (e) denote the BER performances of conventional SIC and ML detectors for UE1 and UE2 symbols at the UE1, respectively, and it can be found in [9].5 According to above optimization problems, we train the DLDet and optimize DL parameters. The training algorithm is given in Algorithm 2. The training settings in Algorithm 2 and the optimized parameters are given in Table 1. Algorithm 2: Training and Parameter Optimization of DLDet at UE1 Data: XI 1,d ,X Q 1,d ,XI 2,d ,X Q 2,d ,YI s1,p,Y Q s1,p,YI s1,d ,Y Q s1,d 1 Initialize DL Parameters (mini batch size, learning rate, maximum epoch) 2 ITrain the network according to P1 and P2 in (15) and (16). 3 if The P3 in (17) P4 in (18) do not converge then 4 IUpdate DL parameters and repeat Step 2 5 end Result: The DLDet at UE1, optimized DL parameters and X̂I 1,d ,X̂ Q 1,d ,X̂ (1),I 2,d ,X̂ (1),Q 2,d C. DATASET GENERATION AND TRAINING DLDet FOR UE2 Since a cooperative communication is included, the detec- tion at the UE2 is performed in the second phase based on the received L-length frames (i.e., ys2 and yr ) within two phases given in (10) and (12), respectively. On the other hand, the UE2 detects only own frames (i.e., x̂2); hence, the out- put has two frames with Ld -length: in-phase and quadrature components of the detected x̂2. As explained in detail at the training of the UE1, the inputs of the DLDet should be reformed to have non-complex frames and the same size with the output frames. To this end, the illustration for the system model of the DLDet at the UE2 is as given in Fig. 2.b. The input frames are given in (19), as shown at the bottom of the next page, and the detected frame is obtained by the outputs of the DLDet as x̂2,d = x̂I 2,d + 1j ∗ x̂ Q 2,d 5In TBS-C-NOMA, the BER performances at UE1 are exactly the same with C-NOMA; thus, we define optimization problems only for C-NOMA. TABLE 1. Training settings and optimized parameters for DLDet at UE1 and UE2. = x̂2(Lp + 1), x̂2(Lp + 2), . . . , x̂2(L) | {z } Ld , (20) where x̂I 2,d and x̂ Q 2,d are the output frames of the DLDet at the UE2. As discussed in the dataset generation of UE1, we consider different SNR values to make the network better in learn- ing. Nevertheless, we should note that the received frame in the second phase in (12) (i.e., yr ) is based on the detected x (1) 2 frame at the UE1 given in (14). Therefore, to generate a dataset for the DLDet at UE2, the proposed DLDet at UE1 should be implemented and the detected frames should be obtained. Considering this, the dataset generation for train- ing of the DLDet at the UE2 is given in Algorithm 3. The outputs of Algorithm 3 are the UE2’s symbols, the pilot responses, and the received signal at the UE2 in both phases. They are given in the matrix form and each rows of these matrices are the Ld -length in-phase and quadrature components of the frames obtained in Steps 5, 8, and 11 of Algorithm 3. It is again worthy noting that the transmitted x2,d frames are included in the dataset since they will be used as the target (desired) outputs at the regression layer during the training process. As being at UE1, the DLDet at UE2 is expected to detect x2 symbols with minimum error. Thus, the optimization problem for the network is given as {P5} = min ( 1 2Ld Ld X i=1
  • 37.
  • 39.
  • 40. 2 ) . (21) Again, we define the optimization problem where DLDet should outperform the conventional detectors as {P6} = min n P (DLDet) 2 (e) − P (TBS−C−NOMA) 2 (e) o , s.t, P (DLDet) 2 (e) P (C−NOMA) 2 (e), (22) VOLUME 9, 2021 61839
  • 41. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA where P (DLDet) 2 (e), P (C−NOMA) 2 (e) and P (TBS−C−NOMA) 2 (e) denote the BER performances of the DLDet at UE2, con- ventional detectors in C-NOMA and TBS-C-NOMA, respec- tively. As explained in the previous section, the MRC + ML is used to detect x2 symbols in C-NOMA and TBS-C-NOMA. As seen in (22), we seek a DLDet which outperforms the C-NOMA and is competitive with the TBS-C-NOMA in terms of error performance. Based on these optimization problems, the training procedure of the DLD for the UE2 is given in Algorithm 4. The training settings in Algorithm 4 and the optimized parameters are given in Table 1. D. PARAMETER SETTING AND HYPER-TUNING In the DL networks, the network design (e.g., number of hid- den layers and cells in each layer) and the training parameters (e.g., learning rate, mini-batch size and maximum epoch) are empirically determined. There is no known rule which gives the optimum network setup and/or training parame- ters. Therefore, a hyper-parameter tuning is required for all DL-aided designs. To this end, in this paper, we have also applied a hyper-tuning for both network design and training parameters. According to the initial trials, we firstly deter- mined the DLDet network setup as a four-layered LSTM network with two hidden LSTM layers which have 30 and 10 cells, respectively. Then, according to Algorithm 1 and Algorithm 3, we have obtained the dataset for both users.6 After obtaining the dataset, the training procedures are per- formed by Algorithm 2 and Algorithm 4 for UE1 and UE2, respectively. To hyper-tune the DL parameters, in Step 3 in both algorithms, the networks are re-trained unless the per- formance converges. As given in the Table 1, we train the both networks by using an ADAM optimizer according to their objective functions (i.e., P1 and P2 in Algorithm 2, and P5 in Algorithm 4) in the Step 2 of both algorithms. In this step, we applied a stopping criterion which ceases training when the validation accuracy does not improve in consecutive epochs. Then, we have updated DL parameters and then re-trained the networks according to these updated DL parameters (see Step 4 in both algorithms) unless the objective functions (i.e., P3 and P4 in Algorithm 2 and P6 in Algorithm 4) converge. In order to reveal the effects of the DL parameters, for some of the training DL parameters, we present the training 6In the dataset generation, any frame size and pilot-to-frame ratio ( φ = (Lp/L)) can be used. These parameters do not affect the training performance much since our frame design and input/output representations remove the effects of them and make the DLDet a flexible detection algorithm which per- forms regardless of frame size and/or pilot-to-frame ratio. We have selected L = 64 and φ = (1/L) (i.e., the worst case). Hereby, it is worthy noting that for a good training, the amount of the data is important; hence, the sample size S should not be too low. yI s2,p = Re                    ys2,p(1), .., ys2,p(Lp) | {z } Lp , . . . , ys2,p(1), . . . , ys2,p(Lp) | {z } Lp    | {z } Ld                  , yI s2,d = Re      ys2(Lp + 1), ys2(Lp + 2), . . . , ys2(L) | {z } Ld      , y Q s2,p = Im                    ys2,p(1), . . . , ys2,p(Lp) | {z } Lp , . . . , ys2,p(1), . . . , ys2,p(Lp) | {z } Lp    | {z } Ld                  , y Q s2,d = Im      ys2(Lp + 1), ys2(Lp + 2), . . . , ys2(L) | {z } Ld      , yI r,p = Re                    yr,p(1), .., yr,p(Lp) | {z } Lp , . . . , yr,p(1), . . . , yr,p(Lp) | {z } Lp    | {z } Ld                  , yI r,d = Re      yr (Lp + 1), yr (Lp + 2), . . . , yr (L) | {z } Ld      , yQ r,p = Im                    yr,p(1), . . . , yr,p(Lp) | {z } Lp , . . . , yr,p(1), . . . , yr,p(Lp) | {z } Lp    | {z } Ld                  , y Q r,d = Im      yr (Lp + 1), yr (Lp + 2), . . . , yr (L) | {z } Ld      . (19) 61840 VOLUME 9, 2021
  • 42. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA TABLE 2. Training results of the DLDet for different DL parameters in 5 dB SNR. results7 of the Step 2 in Algorithm 2 and Algorithm 4 in Table 2 and in Table 3 for the 5 dB and 20 dB SNR values, respectively. We provide performances for two different SNR 7During optimizing the DL parameters, we require the BER performances of the conventional detectors as shown in (17), (18) and (22). Although the BER performances of NOMA are provided with imperfect CSI in [42], [43], to the best of the authors’ knowledge, there is no study for the BER performances of C-NOMA with the imperfect CSI. Therefore, we optimize the DL parameters for the perfect CSI case where the BER performances of the conventional detectors are given in [10]. To this end, for fairness, the pro- posed DLDet for both users in Step 3 of Algorithm 2 and Algorithm 4 are also implemented with the perfect CSI where yI s1,p = hI s1 and y Q s1,p = h Q s1 in Algorithm 2 and yI s2,p = hI s2, y Q s2,p = h Q s2, yI r,p = hI r and y Q r,p = h Q r in Algorithm 4 are used. values to show the effect of the SNR since, especially in the low SNR region, the training parameters may not show the best performance in DL. However, in relatively higher SNR region, the performance converges and the DLDet outper- forms the conventional detectors. In Table 2 and the Table 3, the best performances (minimum P3, P4 and P6) are shown with blue cells. In addition, if we look both tables in detail, we see that in the training, the constraint in P6 is satisfied for almost all training parameters and the DLDet outper- forms the conventional C-NOMA. Nevertheless, to select the same parameters for both networks, we consider the overall performance improving for all SNR region. Besides, in this paper, we mainly aim to maximize the performance gain VOLUME 9, 2021 61841
  • 43. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA TABLE 3. Training results of the DLDet for different DL parameters in 20 dB SNR. for cooperative user and to eliminate the error propagation. Therefore, we select the DL parameters of having the best performance for UE2 which are shown as grey rows in tables (i.e., settings number 21) and these are the DL parameters are given in Table 1. We aware that the selected DL parameters may not give the best P3 performance for UE1, but it gives the best P6 for UE2. In addition, considering this trade-off, one can easily see that the gain in P6 is much more than the loss in P3 since the DLDet provides very similar performance for P3 at UE1 regardless of the DL parameters. The effects of the DL parameters are explained as follow. As seen in Tables 2 and 3, with lower learning rate, the DLDet performs better since it computes the backward error propagation with a lower coefficient. However, this causes a very slow learning process and it converges after some point and not provides further improving. Therefore, we optimize the learning rate as 0.001 which provides a good performance with a relatively faster learning procedure. The mini batch size defines how many samples will be taken from the dataset in every training epoch. Therefore, there is a reverse relationship between mini batch size and the maximum epoch. Indeed, if the maximum epoch is not chosen largely enough for a mini batch size, the learning will not converge. On the other hand, if a too large maximum epoch is chosen, the DLDet may start to memorize 61842 VOLUME 9, 2021
  • 44. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA Algorithm 3: Dataset Generation for DLDet at UE2 Data: S, L, Lp, Ld , SNR 1 for each SNR value in SNR do 2 for s = 1 : S do 3 IGenerate Lp-length xp known-pilot symbols at the BS. 4 IGenerate random Ld log2 Mi, i = 1, 2 bits for UE1 and UE2 and obtain the Ld -length x1,d and x2,d by mapping random bits to xi by Mi-ary modulation. 5 IObtain the L-length xi, i = 1, 2 frames by using (9). 6 IGenerate random Rayleigh channel coefficients (hλ, λ = s1, s2) and generate random AWGN process (nλ, λ = s1, s2). 7 IAccording to (10), calculate the yλ, λ = s1, s2 with L length and then based on the yλ, reform the Ld -length yI λ,p, y Q λ,p,yI λ,d , y Q λ,d by using (13) and (19). 8 I Implement the DLDet at the UE1 and detect O x (1) 2,d as given in (14). Generate Lp-length xp known-pilot symbols at the UE1. Then, obtain the transmitted frame in the second phase given in (11). 9 IGenerate random Rayleigh channel coefficient hr and the random AWGN process (nr ). 10 IAccording to (12), calculate the yr . Then, with respect to yr , obtain yI r,p, y Q r,p,yI r,d and y Q r,d by using (19) 11 end 12 end Result: XI 2,X Q 2 ,YI s2,p,Y Q s2,p,YI s2,d ,Y Q s2,d , YI r,p,Y Q r,p,YI r,d ,Y Q r,d the dataset rather than learning. Likewise, if the mini batch size is chosen too low, the learning may not be performed. In other words, unless too small or too large parameters are chosen, the training procedure will eventually converge to almost the same performance regardless of these parameters. This determines mostly the training time. However, if too small or too large parameters are chosen, the training may not be completed successfully. Similar explanations are also given in [41] as: ‘‘LSTM works well over a broad range of parameters such as learning rate, input gate bias, and output gate bias. However, a large learning rate pushes the output gates towards zero, thus automatically countermand- ing its own negative effects.’’ Based on these discussions and the results given in Table 2 and Table 3 (obtained by Algorithm 2 and Algorithm 4), we optimize the parameters as given in Table 1. Algorithm 4: Training and Parameter Optimization of DLDet for UE2 Data: XI 2,X Q 2 ,YI s2,p,Y Q s2,p,YI s2,d ,Y Q s2,d ,YI r,p, Y Q r,p,YI r,d ,Y Q r,d 1 Initialize DL Parameters (mini batch size, learning rate, maximum epoch) 2 ITrain the network according to P5 in (21). 3 if The P6 in (22) does not converge then 4 IUpdate DL parameters and repeat Step 2 5 end Result: The DLDet at UE2, optimized DL parameters and X̂I 2,d ,X̂ Q 2,d To further present the effects of the DL parameters on the training, we present BER performances of the DLDet at UE1 and UE2 in Fig. 3 and Fig. 4, respectively. In Fig. 3, we present BER performances for detecting UE1’s and UE2’s symbols with respect to transmit SNR for five different train- ing DL parameter sets (i.e., Settings numbers 9, 18, 21, 25 and 26) from Tables 2 and 3. These five DL parameter sets are selected in a way that they have the closest performances to the selected setting. Likewise, in Fig. 4, we present BER per- formance at the UE2 for the same DL parameter sets. In both figures, we can easily see that the selected DL parameters (i.e., Setting number 21) provide the best BER performances (training performance) in overall, although some of the other DL parameters could give better performance for only spe- cific cases (e.g., SNR or only one signal detection). E. COMPLEXITY The proposed networks are trained offline and then are imple- mented as online detection algorithms. The online imple- mentation complexity is more meaningful. An LSTM cell is local in space and time; its computational complexity per time step and weight is O(1) [41]. Thus, the feed-forward calculation (implementation) complexity is obtained by the number of weights (i.e., W) in the hidden layer. Thus, the end- to-end implementation complexity of the DLDet is given by O(W1W2) = O(30 × 10). Then, for comparisons, we cal- culate the computational complexity for conventional esti- mation/detection algorithms. On the one hand, as given in Section II.C, the UE1 should implement a channel estima- tion algorithm to acquire CSI, an ML detector to detect UE2’s symbols and an SIC to detect own symbols. According to [44], the computational complexity of an MMSE channel estimation algorithm can be found as O(3Lp + 4). The com- putational complexities of an ML detection and SIC are given by O(4M2) and O(4M1 +2), respectively, where Mi, i = 1, 2 is the modulation order for the users’ symbols. Thus, the total complexity for UE1 is obtained as O(3Lp +4(M1 +M2)+6). It is noteworthy that this total complexity is given for con- ventional C-NOMA, if the TBS-C-NOMA is implemented to increase the error performance, additional complexity will VOLUME 9, 2021 61843
  • 45. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA FIGURE 3. BER comparisons at the UE2 for different DL parameter settings (given setting numbers in Tables 2 and 3) in the training. be introduced to obtain the optimal threshold value along with latency to acquire CSI knowledge of all links. On the other hand, the UE2 should implement two times channel estimation algorithms to acquire CSI (i.e., one for between BS-UE1 and one for between UE1-UE2), an MRC technique and an ML detector. The computational complexity of the MRC could be simplified as O(3). Therefore, the total com- putational complexity for UE2 in conventional schemes turns out to be O(6Lp + 4M2 + 11). Based on the above com- parisons, the computational complexity of the DLDet might be a bit higher than the conventional detectors, especially when the modulation orders and pilot size are relatively low. However, one can easily see that the complexity of DLDet is fixed, whereas the complexity of the conventional detectors is increased by the length of pilot size and modulation orders. Besides, as it will be discussed in detail in the next section, the BER performance of the conventional detectors is severe when low pilot sizes are used. Thus, the pilot size should be increased so that similar computational complexities are FIGURE 4. BER comparisons at the UE1 for different DL parameter settings (given setting numbers in Tables 2 and 3) in the training. required for both proposed and conventional methods. More- over, the proposed DLDet outperforms conventional detec- tion/estimation algorithms significantly even if very high pilot sizes are used for conventional detectors. Therefore, we can afford this slight increase in complexity in return for considerable performance gain (i.e., up to ∼ 10 dB in some cases). Lastly, with the last technological developments nowadays, even mobile devices have very high computational capacity; hence, the proposed DLDet can be easily imple- mented in end-devices. IV. SIMULATION RESULTS In this section, we implement the proposed DLDet for both users and perform experiments on synthetic datasets. In the simulations, we use a PC with an Intel Core i7-9750H CPU and an Nvidia Quadro P6000 GPU for acceleration on train- ing and it shows that the DLDet can be trained and imple- mented on an ordinary laptop PC. In the simulations, we use an offline training and an online implementation. Once the training is completed, the proposed DLDet network models are used as online detectors for the users instead of the con- ventional detectors.8 The link-level Monte-Carlo simulations are conducted on MATLAB with 106 iterations for each scenario to validate the performance comparisons with the existing C-NOMA schemes in terms of BER. In all figures, we assume that the power of the relay (near user) is equal to half of the power of BS (i.e., Pr = (Ps/2)). We present the simulations in two parts according to the fading conditions, where in the first section we evaluate the performances over 8In the practical scenarios, the mobile users are moving so that the near user (UE1) and far user (UE2) may change from time to time. Since both users should implement different detector schemes (e.g., SIC in UE1 whereas MRC+ML in UE2), this information should be conveyed to the users whether they are the near or far users. This information is transferred to the users with Forward Control Channel (FCC). Likewise the conventional C-NOMA, with the proposed DLDet scheme, according to FCC signal, the users choose one of the offline-trained DLDets in the online implementation. Since we use exactly the same frame and input representations, both users could use the correct DLDet scheme without any additional process. 61844 VOLUME 9, 2021
  • 46. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA TABLE 4. Channel Conditions in the Simulations. Rayleigh fading channels by using the same and different channel conditions as those of the training. Nevertheless, it is important to note that the channel fading coefficients in the simulations are newly randomly generated and not the same in the training dataset. Then, in the second subsection, we use the proposed DLDet over different fading channels (i.e., Nakagami-m and Rician). In all simulations, in case the perfect CSI is not available for the conventional detector, we implement the minimum mean square error (MMSE) channel estimation [44] which has the best channel estimation performance within the con- ventional channel estimation algorithms. Nevertheless, it is worthy noting that the MMSE is implemented based on that the second-order statistics of the channels are known, whereas the proposed DLDet does not require this and pro- vides a semi-blind symbol detection simultaneously. Besides, in all simulations, to reveal the effect of pilot size on the performances of both the proposed DLDet and conventional detectors, we present results for various pilot-to-frame size ratios, where φ = (Lp/L) is defined. Unless otherwise is stated, we use L = 64 in all simulations. A. RAYLEIGH FADING CHANNELS In this subsection, we implement the proposed DLDet for C-NOMA over Rayleigh fading channels as being in the offline training procedure. We present simulation results for various channel scenarios where one of them (i.e., Scenario I) has the same second-order statistics (i.e., E[|hλ|2], λ = s1, s2, r) with the training and two of them have different (i.e., Scenario II and Scenario III). The channel conditions in each scenario are given in Table 4. In the given scenarios, channel qualities are chosen equal (i.e., Scenario I and Scenario III) and different (i.e., Scenario II) to represent the practical scenarios where the second-order statistics change mainly based on the dis- tance between nodes (see Footnote 2). 1) THE SAME SECOND-ORDER STATISTICS WITH THE TRAINING Firstly, we present BER comparisons of both symbols at the UE1 for Scenario I in Fig. 5. One can easily see that the proposed DLDet at UE1 performs well in detecting both symbols jointly. Especially, with the low pilot-to-frame ratio (φ), the proposed DLDet outperforms conventional esti- mation plus detection algorithms substantially. This is quite promising since a pilot-assisted (semi-blind) joint symbol detection can be performed simultaneously with a very low pilot signal size; therefore, the achievable capacity is not reduced due to pilot signals. Besides, an iterative detection (i.e., SIC) is not required anymore since the DLDet performs a joint symbol detection. In both figures, we also provide the BER results for the perfect CSI case where it is seen that the performances of both methods converge. This is compatible with the results in Tables 2 and 3 and proves that the proposed Algorithm 2 not only optimizes the results in training but also in online implementation. Furthermore, the DLDet outperforms the conventional detector in detecting UE2 symbols at the UE1 regardless of the pilot-to-frame ratio or perfect CSI case. This improvement in the BER performance of UE2 symbols is quite important to reduce the error propagation in C-NOMA [9]. In this paper, we aim to improve the BER performance of C-NOMA. Therefore, after this point, we will not provide the BER results at the UE1 since Fig. 5 already proves that the DLDet at UE1 pro- vides remarkable BER performances for both users’ symbols. Then in Fig. 6, we provide BER comparisons for the UE2 in Scenario I. In the comparisons, we present BER perfor- mances of conventional detectors for both C-NOMA [9] and TBS-C-NOMA [10]. One can easily see that the DLDet out- performs C-NOMA regardless of the CSI case or φ. This per- formance improvement is more than 10 dB. In other words, the DLDet achieves the same BER performance of C-NOMA with 10 dB less power consumption, which is a superb gain by considering the energy-limited networks or green commu- nication concept in the future wireless networks. This proves the power of the DLDet in detecting cooperative signals even though an error propagation exists in the cooperative phase. Besides, this detecting is performed based on the pilot signals simultaneously. This shows that the proposed DLDet is capa- ble of a semi-blind detection of cooperative signals without any additional channel estimation and/or combining tech- niques. On the other hand, the DLDet also outperforms the VOLUME 9, 2021 61845
  • 47. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA FIGURE 5. BER comparisons between conventional detectors and proposed DLDet at UE1 for Scenario I. conventional detector in TBS-C-NOMA. The performance improvement in this case changes between ∼ 2−6 dB accord- ing to φ. This is lower compared to the gain over conventional C-NOMA. However, we should note that the TBS-C-NOMA performances are obtained by using the optimum threshold values (in terms of error performance) in [10] and it is clear that this performance improvement will increase when the threshold values are optimized by considering all perfor- mance metrics [11]. Besides, it is utmost to note that there is a trade-off in TBS-C-NOMA where the BER performance is increased with the penalty of capacity and outage degradation compared to the C-NOMA [11]. Furthermore, to determine the threshold at the UE1, a signaling overhead is introduced where the channel conditions of UE2 is required. Therefore, outperforming the TBS-C-NOMA makes more impact since the DLDet implements a conventional C-NOMA without introducing a threshold at the UE1. Hence, the BER perfor- mance improvement is guaranteed without paying any cost in terms of capacity/outage performance or signaling overhead. FIGURE 6. BER comparisons between conventional detectors and proposed DLDet at UE2 for Scenario I. To investigate the effect of the frame size (i.e., L), in Fig. 7 and Fig. 8, we present the same performances evaluations of Fig. 5 and Fig. 6 for three frame sizes (i.e., L = 32, 64, 128) and various pilot-to-frame ratios (i.e., φ). It is noteworthy that the DLDet for both users is trained offline with L = 64 and φ = (1/L). Nevertheless, it can be used for any frame size and/or pilot-to-frame ratio. This is achieved thanks to the frame design and input representation (given in Section III.A) since with the reforming steps in the input design, we guarantee all inputs to have the same length with the outputs (data symbol length (Ld )) and this provides a flexible online implementation. In the light of these explanations, in Fig. 7 and Fig. 8, one can easily see that the frame size does not change the performance much for both users. Nevertheless, as expected, with the increase of φ, the performance is improved. This is explained as follows. By increasing φ, the pilot response inputs (i.e., yI λ,p, y Q λ,p) have more informative knowledge on the exposed AWGN so that the higher correlation is achieved and the performance is increased. It is also a known phonema for the conventional estimation/detection algorithms. As seen in Fig. 7 and Fig. 8, the frame size does not affect the performance much. Thus, for the illustration sim- plicity, after this point, we provide simulation results for only L = 64. Besides, as seen in Fig. 6, since the performance gaps between the proposed DLDet and the conventional detec- tors in C-NOMA are very high, again for better illustration, we present comparisons for only TBS-C-NOMA in the fol- lowing figures. Nevertheless, for a reference point, we still give the results of C-NOMA for only perfect CSI. 2) DIFFERENT SECOND-ORDER STATISTICS THAN THE TRAINING Then, to reveal the robustness of the DLDet to the various channel conditions, we present BER comparisons for the UE2 in Scenarios II and III (which were not included in training) in Fig. 9 and Fig. 10, respectively. As seen in both 61846 VOLUME 9, 2021
  • 48. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA FIGURE 7. BER comparisons of the DLDet at UE1 for different frame size (L) and pilot-to-frame ratio (φ) in Scenario I. FIGURE 8. BER comparisons of the DLDet at UE2 for different frame size (L) and pilot-to-frame ratio (φ) in Scenario I. figures, the DLDet still outperforms conventional C-NOMA remarkably even though the results of conventional C-NOMA are given in perfect CSI. The DLDet is also superior to the TBS-C-NOMA in all pilot-to-frame size ratio (φ) scenarios. FIGURE 9. BER comparisons between conventional detectors and proposed DLDet at UE2 for Scenario II. FIGURE 10. BER comparisons between conventional detectors and proposed DLDet at UE2 for Scenario III. The performance gain is relatively more with the low φ. This again shows that the DLDet performs well in semi-blind joint channel estimation and symbol detection with a very low pilot usage which ensures the capacity improvement. Indeed, the DLDet can outperform the TBS-C-NOMA even with the perfect CSI, although a semi-blind detection is performed in DLDet with very low φ (for only φ ≥ (1/16)). In both figures, it is clearly seen that the DLDet outperforms the TBS-C- NOMA; hence, the above discussions in Scenario I and the provided advantages by the proposed DLDet are still valid when the channel conditions change. In addition, as seen in both figures, the full diversity order (i.e., 2) is achieved by the DLDet, although it can not be observed in conventional C-NOMA due to the error propagation. The performance improvements in Fig. 9 and Fig. 10 show that the proposed DLDet can be used as an online detection algorithm although the channel conditions change once it is trained offline. This robustness against the channel conditions is ensured thanks to VOLUME 9, 2021 61847
  • 49. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA FIGURE 11. BER comparisons between conventional detectors and proposed DLDet at UE2 for Scenario IV. the power of LSTM networks and our frame design and rep- resentation. As it is discussed in detail in Section III, we have such a frame design and input/output representation in the training that the LSTM-based DLDet can learn dependencies between inputs and within frame. The DLDet can adapt any channel condition even though it is not trained on that channel condition. Thus, the DLDet could be preferred as an online detection/estimation algorithm as long as the same frame structure and input representations with those of training are used in the online implementation. B. IMPLEMENTATION OVER DIFFERENT FADING CHANNELS In this subsection, we implement the DLDet for C-NOMA over different fading channels although it is trained with Rayleigh fading channel in the offline training. We present the result for Nakagami-m and Rician fading channels. The chan- nel conditions for those fading channels are given in Table 4. In Table 4, λ and mλ denote the spread and shape parameters for Nakagami-m fading channels where λ = E[|hλ|2] and mλ = 2 λ Var[|hλ|2] are defined. For Rician fading channel, Kλ denotes the Rician factor (i.e., line-of-sight-to-multi-path power ratio) and λ = E[|hλ|2] is the scaling factor. In the given scenarios, as being in Rayleigh fading environments, we cover both equal (i.e., Scenarios IV, VI, VII, and IX) and different (i.e., Scenarios V and VII) channel qualities to rep- resent the practical distance-dependent (see Footnote 2) sce- narios. In the comparisons, we present the performances of TBS-C-NOMA with optimum threshold values of Rayleigh fading channels given in [10] since there is no work which provides the optimum values over Nakagami-m and Rician fading channels. Nevertheless, we have empirically tried other threshold values and observed that these values are most close to the optimum for also Nakagami-m and Rician fading channels. FIGURE 12. BER comparisons between conventional detectors and proposed DLDet at UE2 for Scenario V. FIGURE 13. BER comparisons between conventional detectors and proposed DLDet at UE2 for Scenario VI. In Figs. 11-13, we present comparisons over Nakagami-m fading channels in Scenarios IV, V, and IV, respectively. In all figures, one can easily see that the DLDet still outperforms conventional detection algorithms although it is not trained/optimized for Nakagami-m fading channels. For all scenarios, the performance gain of the DLDet over conventional C-NOMA is impressive even though the perfect CSI is assumed in conventional C-NOMA. The DLDet can beat the conventional C-NOMA for any φ value. This means that the DLDet is better than the conventional C-NOMA even with only one pilot signal. In Fig. 11 and Fig. 12, m = 0.5 represents the worse channel conditions than Rayleigh fading whereas in Fig. 13, m = 2 represents better channel condi- tion. One can easily see that the DLDet is also better than TBS-C-NOMA. The performance gain over TBS-C-NOMA is between ∼ 3−5 dB, ∼ 1−3 dB and ∼ 5−8 dB in Fig. 11, Fig. 12 and Fig. 13, respectively. This reveals the power of the DLDet and shows that we can achieve better BER 61848 VOLUME 9, 2021
  • 50. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA FIGURE 14. BER comparisons between conventional detectors and proposed DLDet at UE2 for Scenario VII. FIGURE 15. BER comparisons between conventional detectors and proposed DLDet at UE2 for Scenario VIII. performance than TBS-C-NOMA without paying any cost (i.e., capacity/outage performance decay and/or signaling overhead) introduced by the TBS-C-NOMA. Especially with the low pilot-to-frame ratio (i.e., φ) usage, the performance gain of DLDet becomes greater. The only case that the TBS-C-NOMA has similar performance to the DLDet is the Scenario V with a very high pilot-to-frame ratio (φ = (1/2)). However, this use-case is not effective due to the high pilot- to-frame ratio (since it decreases informative (data) spectral efficiency) and the DLDet has a superb gain in any other other pilot-to-frame ratio usage. Indeed, with the increase of m (see Fig. 13) parameter, the DLDet outperforms even the perfect CSI case in TBS-C-NOMA notably with all pilot-to-frame size ratio (except φ = (1/64)). When we compare the results within Fig. 11-Fig. 13, the DLDet achieves the full diversity order (i.e., 2m); thus, the Scenario VI in Fig. 13 has the best performance. On the other hand, as expected, when the channel qualities are improved, the Scenario V in Fig. 12 has FIGURE 16. BER comparisons between conventional detectors and proposed DLDet at UE2 for Scenario IX. better performance than the Scenario IV in Fig. 11. Never- theless, this improvement is a horizontal gain and provides no additional diversity since the diversity order is related to m parameter. Lastly, we present BER comparisons over also Rician fading channels for Scenarios VII, VIII, and IX in Fig. 14, Fig. 15 and Fig. 16, respectively. As being in all above comparisons, the DLDet performs better than conventional C-NOMA for all φ. In this regard, we can easily say that the DLDet is superior to the conventional C-NOMA regard- less of the channel conditions, although the perfect CSI is assumed in conventional C-NOMA. Again, the DLDet can also outperform TBS-C-NOMA over Rician fading channels. Since the Rician fading channel represents better channel conditions than Rayleigh fading channel (i.e., K = 0 → Rayleigh), the performance gain of DLDet gets better over Rician fading channels as being in Nakagami-m simulations (for m = 2 in Fig. 13). In addition, likewise in Nakagami-m simulations in Fig. 11- Fig. 13, with the increase of K (see Fig. 16), the DLDet can achieve better performance than the perfect case of the TBS-C-NOMA for all pilot-to- frame size ratio (φ). This is quite promising. Based on the evaluations in Fig. 11-Fig. 16, one can easily see that the DLDet, as an online detection algorithm, is completely robust to different fading conditions, although it is only trained for Rayleigh fading channel conditions in the offline training stage. This, as repeated above, is achieved by our frame rep- resentations and the power of the LSTM networks in learning dependencies/correlation within inputs/data-frame. V. CONCLUSION AND FUTURE WORKS In this paper, we propose a data-driven DL network to detect users’ symbols jointly in C-NOMA. The proposed DL-based detection (DLDet) is trained to be able to detect both users’ symbols jointly at the near user (UE1) without an SIC pro- cess. Besides, the same network is also optimized to detect VOLUME 9, 2021 61849
  • 51. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA cooperative signals at the far user (UE2) instead of using and MRC plus ML. Furthermore, the proposed DLDet is able to detect symbols jointly without acquiring an additional channel estimation algorithm since it can perform a simulta- neous detection based on the pilot responses, thus providing a semi-blind joint detection. Besides, this is achieved with a very low pilot-to-frame size ratio. In both users, the DLDet outperforms the conventional detectors. Indeed, the perfor- mance increase for the UE2 is superb over C-NOMA (i.e., ∼ 10 dB) and TBS-C-NOMA (i.e., ∼ 3−7 dB) over Rayleigh fading channels. This less power consumption is very crucial for the green communication concept in 5G and beyond networks. Moreover, outperforming the TBS-C-NOMA with- out introducing a threshold is quite important since the TBS-C-NOMA introduces a signaling overhead and capac- ity performance decay. These problems have been resolved by the DLDet. Moreover, we implement the offline-trained DLDet over different fading channels (i.e., Nakagami-m and Rician). With extensive simulations, we reveal that the DLDet still outperforms conventional detectors over different fading channels and provides the full diversity order (i.e., 2 for Rayleigh and Rician, and 2m for Nakagami-m ) although the offline trained is completed with only limited Rayleigh fading conditions. This reveals the robustness of the DLDet to different fading conditions. In other words, the offline- trained DLDet can be used as an online detection algorithm regardless of the fading conditions once it is trained offline for any fading channel. Based on the specific results of this paper, we believe that the proposed DLDet could be further improved to cover other aspects of the communications systems. To this end, we summarize the future works as follows. Practical Implementation: As discussed in this paper, the pre-trained DLDet performs well under various chan- nel conditions although it is only trained for Rayleigh channel conditions. Therefore, the proposed DLDet can be used an online detection algorithm in any practical cooperative-NOMA use-case as long as the same struc- ture (e.g., frame design and input/output representations) is used for the transmission. To this end, an online testbed (e.g., software defined radio (SDR)) implementation [45] of the pre-trained DLDet is considered a future work. Coded Scenarios: In this paper, we consider an uncoded C-NOMA scheme and prove that the DLDet outperforms the conventional estimation/detection algorithms. On the other hand, the power of the DL networks has been also demon- strated in coded scenarios [46]. However, the existing coded works consider only a point-to-point communication. Thus, the extension for much complex networks such as C-NOMA (an interference due to the NOMA and two phases due to cooperative communication are included) requires more effort. The coded scenario was beyond the scope of this paper, but, it is one of the main directions of the future works. With a true dataset and training, we believe that the DLDet could be extended for all coded cooperative and NOMA schemes such as LPDC, Turbo and Polar coding. Fully-Blind Detection: In this paper, to improve the per- formance of the DLDet, we perform a semi-blind multi- user detection by using pilot responses such that giv- ing a channel-informative input to the network. However, the pilot signals cause an inefficient resource usage due to non-informative data transmission. Although the proposed DLDet outperforms the existing algorithms with a very low pilot-to-frame ratio (i.e., non-informative-to-informative data ratio), the question may raise that could we perform detec- tion without any pilot signal? For now, we would answer that question for the DLDet as: No. Nevertheless, the recent initial results for fully-blind detection are promising. In [47], the authors demonstrated that a DL-aided fully-blind detec- tion is possible for a point-to-point communication. How- ever, as discussed in the coded scenarios, the extensions for such complex networks (e.g., C-NOMA) are still to be explored. Besides, for a fully-blind detection, an autoencoder and autodecoder are required rather than only a detection solution. Thus, the transmitter should be also re-designed for a fully-blind detection. This is the another aspect of the future works. DL-aided Detection for Other Physical Layer Techniques: This paper reveals the power of the DLDet for signal detec- tion in C-NOMA where an interference due to the NOMA and an error propagation from near user to far user exist. To this end, the DLDet can be used in other NOMA-involved systems such as NOMA-based mobile edge computing and reconfigurable intelligent surfaces (RIS)/backscatter com- munication (BCOM) assisted-NOMA schemes [48], [49]. Besides, the proposed DLDet can also be applied for other interference-introduced schemes. Hence, a lightweight DL-aided detection for faster than Nyquist signaling (FTNS) [50] is to be next step of this paper. REFERENCES [1] A. Osseiran, F. Boccardi, V. Braun, K. Kusume, P. Marsch, M. Maternia, O. Queseth, M. Schellmann, H. Schotten, H. Taoka, H. Tullberg, M. A. Uusitalo, B. Timus, and M. Fallgren, ‘‘Scenarios for 5G mobile and wireless communications: The vision of the METIS project,’’ IEEE Commun. Mag., vol. 52, no. 5, pp. 26–35, May 2014. [2] M. Agiwal, A. Roy, and N. Saxena, ‘‘Next generation 5G wireless net- works: A comprehensive survey,’’ IEEE Commun. Surveys Tuts., vol. 18, no. 3, pp. 1617–1655, 3rd Quart., 2016. [3] F. Boccardi, R. W. Heath, Jr., A. Lozano, T. L. Marzetta, and P. Popovski, ‘‘Five disruptive technology directions for 5G,’’ IEEE Commun. Mag., vol. 52, no. 2, pp. 74–80, Feb. 2014. [4] L. Dai, B. Wang, Y. Yuan, S. Han, I. Chih-Lin, and Z. Wang, ‘‘Non- orthogonal multiple access for 5G: Solutions, challenges, opportuni- ties, and future research trends,’’ IEEE Commun. Mag., vol. 53, no. 9, pp. 74–81, Sep. 2015. [5] Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan, and L. Hanzo, ‘‘Nonorthogonal multiple access for 5G and beyond,’’ Proc. IEEE, vol. 105, no. 12, pp. 2347–2381, Dec. 2017. [6] A. Benjebbour, A. Li, Y. Kishiyama, H. Jiang, and T. Nakamura, ‘‘System- level performance of downlink NOMA combined with SU-MIMO for future LTE enhancements,’’ in Proc. IEEE Globecom Workshops (GC Wkshps), no. 1, Dec. 2014, pp. 706–710. [7] M. Vaezi, G. A. A. Baduge, Y. Liu, A. Arafa, F. Fang, and Z. Ding, ‘‘Interplay between NOMA and other emerging technologies: A sur- vey,’’ IEEE Trans. Cognit. Commun. Netw., vol. 5, no. 4, pp. 900–919, Dec. 2019. 61850 VOLUME 9, 2021
  • 52. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA [8] Z. Ding, M. Peng, and H. V. Poor, ‘‘Cooperative non-orthogonal multiple access in 5G systems,’’ IEEE Commun. Lett., vol. 19, no. 8, pp. 1462–1465, Aug. 2015. [9] F. Kara and H. Kaya, ‘‘On the error performance of cooperative- NOMA with statistical CSIT,’’ IEEE Commun. Lett., vol. 23, no. 1, pp. 128–131, Jan. 2019. [Online]. Available: https://ieeexplore. ieee.org/document/8515248/ [10] F. Kara and H. Kaya, ‘‘Threshold-based selective cooperative-NOMA,’’ IEEE Commun. Lett., vol. 23, no. 7, pp. 1263–1266, Jul. 2019. [Online]. Available: https://ieeexplore.ieee.org/document/8707000/ [11] F. Kara and H. Kaya, ‘‘Threshold-based selective cooperative NOMA: Capacity/outage analysis and a joint power allocation- threshold selection optimization,’’ IEEE Commun. Lett., vol. 24, no. 9, pp. 1929–1933, Sep. 2020. [Online]. Available: https://ieeexplore. ieee.org/document/9097857/ [12] F. Kara, H. Kaya, O. Erkaymaz, and F. Ozturk, ‘‘Prediction of the optimal threshold value in DF relay selection schemes based on arti- ficial neural networks,’’ in Proc. Int. Symp. Innov. Intell. Syst. Appl. (INISTA), Aug. 2016, pp. 1–6. [Online]. Available: http://ieeexplore.ieee. org/document/7571823/ [13] H. Ye, G. Y. Li, and B.-H. Juang, ‘‘Power of deep learning for channel esti- mation and signal detection in OFDM systems,’’ IEEE Wireless Commun. Lett., vol. 7, no. 1, pp. 114–117, Feb. 2018. [14] H. He, C.-K. Wen, S. Jin, and G. Y. Li, ‘‘Deep learning-based channel esti- mation for beamspace mmWave massive MIMO systems,’’ IEEE Wireless Commun. Lett., vol. 7, no. 5, pp. 852–855, Oct. 2018. [15] S. Dorner, S. Cammerer, J. Hoydis, and S. T. Brink, ‘‘Deep learning based communication over the air,’’ IEEE J. Sel. Topics Signal Process., vol. 12, no. 1, pp. 132–143, Feb. 2018. [16] H. Kim, S. Oh, and P. Viswanath, ‘‘Physical layer communication via deep learning,’’ IEEE J. Sel. Areas Inf. Theory, vol. 1, no. 1, pp. 5–18, May 2020. [17] T. Wang, C.-K. Wen, H. Wang, F. Gao, T. Jiang, and S. Jin, ‘‘Deep learning for wireless physical layer: Opportunities and challenges,’’ China Commun., vol. 14, no. 11, pp. 92–111, Nov. 2017. [18] T. O’Shea and J. Hoydis, ‘‘An introduction to deep learning for the physical layer,’’ IEEE Trans. Cognit. Commun. Netw., vol. 3, no. 4, pp. 563–575, Dec. 2017. [19] Z. Qin, H. Ye, G. Y. Li, and B.-H.-F. Juang, ‘‘Deep learning in phys- ical layer communications,’’ IEEE Wireless Commun., vol. 26, no. 2, pp. 93–99, Apr. 2019. [20] H. He, S. Jin, C.-K. Wen, F. Gao, G. Y. Li, and Z. Xu, ‘‘Model-driven deep learning for physical layer communications,’’ IEEE Wireless Commun., vol. 26, no. 5, pp. 77–83, Oct. 2019. [21] J. Ren and Z. Wang, ‘‘A novel deep learning method for application identi- fication in wireless network,’’ China Commun., vol. 15, no. 10, pp. 73–83, Oct. 2018. [22] A. Zappone, M. Di Renzo, and M. Debbah, ‘‘Wireless networks design in the era of deep learning: Model-based, AI-based, or both?’’ IEEE Trans. Commun., vol. 67, no. 10, pp. 7331–7376, Oct. 2019. [23] T. V. Luong, Y. Ko, N. A. Vien, D. H. N. Nguyen, and M. Matthaiou, ‘‘Deep learning-based detector for OFDM-IM,’’ IEEE Wireless Commun. Lett., vol. 8, no. 4, pp. 1159–1162, Aug. 2019. [24] H. Huang, Y. Song, J. Yang, G. Gui, and F. Adachi, ‘‘Deep-learning-based millimeter-wave massive MIMO for hybrid precoding,’’ IEEE Trans. Veh. Technol., vol. 68, no. 3, pp. 3027–3032, Mar. 2019. [25] M. Kim, N.-I. Kim, W. Lee, and D.-H. Cho, ‘‘Deep learning-aided SCMA,’’ IEEE Commun. Lett., vol. 22, no. 4, pp. 720–723, Apr. 2018. [26] N. Ye, X. Li, H. Yu, A. Wang, W. Liu, and X. Hou, ‘‘Deep learning aided grant-free NOMA toward reliable low-latency access in tactile Internet of Things,’’ IEEE Trans. Ind. Informat., vol. 15, no. 5, pp. 2995–3005, May 2019. [27] N. Ye, X. Li, H. Yu, L. Zhao, W. Liu, and X. Hou, ‘‘Deep- NOMA: A unified framework for NOMA using deep multi-task learn- ing,’’ IEEE Trans. Wireless Commun., vol. 19, no. 4, pp. 2208–2225, Apr. 2020. [28] M. Choi, D. Yoon, and J. Kim, ‘‘Blind signal classification for non- orthogonal multiple access in vehicular networks,’’ IEEE Trans. Veh. Tech- nol., vol. 68, no. 10, pp. 9722–9734, Oct. 2019. [29] N. Zhang, K. Cheng, and G. Kang, ‘‘A machine-learning-based blind detection on interference modulation order in NOMA systems,’’ IEEE Commun. Lett., vol. 22, no. 12, pp. 2463–2466, Dec. 2018. [30] J. Zhang, X. Tao, H. Wu, N. Zhang, and X. Zhang, ‘‘Deep rein- forcement learning for throughput improvement of the uplink grant-free NOMA system,’’ IEEE Internet Things J., vol. 7, no. 7, pp. 6369–6379, Jul. 2020. [31] N. Yang, H. Zhang, K. Long, H.-Y. Hsieh, and J. Liu, ‘‘Deep neural network for resource management in NOMA networks,’’ IEEE Trans. Veh. Technol., vol. 69, no. 1, pp. 876–886, Jan. 2020. [32] M. Liu, T. Song, and G. Gui, ‘‘Deep cognitive perspective: Resource allocation for NOMA-based heterogeneous IoT with imperfect SIC,’’ IEEE Internet Things J., vol. 6, no. 2, pp. 2885–2894, Apr. 2019. [33] G. Gui, H. Huang, Y. Song, and H. Sari, ‘‘Deep learning for an effec- tive nonorthogonal multiple access scheme,’’ IEEE Trans. Veh. Technol., vol. 67, no. 9, pp. 8440–8450, Sep. 2018. [34] M. AbdelMoniem, S. M. Gasser, M. S. El-Mahallawy, M. W. Fakhr, and A. Soliman, ‘‘Enhanced NOMA system using adaptive coding and modulation based on LSTM neural network channel estimation,’’ Appl. Sci., vol. 9, no. 15, pp. 1–19, Jul. 2019. [35] Narengerile and J. Thompson, ‘‘Deep learning for signal detection in non- orthogonal multiple access wireless systems,’’ in Proc. UK/China Emerg. Technol. (UCET), Aug. 2019, pp. 1–4. [36] A. Emir, F. Kara, and H. Kaya, ‘‘Deep learning detectors with pilot interval reduction in uplink non orthogonal multiple access,’’ in Proc. 28th Signal Process. Commun. Appl. Conf. (SIU), Gaziantep, Turkey, Oct. 2020, pp. 1–4. [Online]. Available: https://ieeexplore.ieee. org/abstract/document/9302252 [37] A. Emir, F. Kara, and H. Kaya, ‘‘Deep learning-based joint symbol detection for NOMA,’’ in Proc. 27th Signal Process. Commun. Appl. Conf. (SIU), Sivas, Turkey, Apr. 2019, pp. 1–4. [Online]. Available: https: //ieeexplore.ieee.org/document/8806600/ [38] J.-M. Kang, I.-M. Kim, and C.-J. Chun, ‘‘Deep learning-based MIMO- NOMA with imperfect SIC decoding,’’ IEEE Syst. J., vol. 14, no. 3, pp. 3414–3417, Sep. 2020. [39] C. Lin, Q. Chang, and X. Li, ‘‘A deep learning approach for MIMO- NOMA downlink signal detection,’’ Sensors, vol. 19, no. 11, p. 2526, Jun. 2019. [40] A. Emir, F. Kara, H. Kaya, and H. Yanikomeroglu, ‘‘DeepMuD: Multi- user detection for uplink grant-free NOMA IoT networks via deep learning,’’ IEEE Wireless Commun. Lett., early access, Feb. 19, 2021. [Online]. Available: https://ieeexplore.ieee.org/document/9359664, doi: 10.1109/LWC.2021.3060772. [41] S. Hochreiter and J. Schmidhuber, ‘‘Long short-term memory,’’ Neural Comput., vol. 9, no. 8, pp. 1735–1780, Nov. 1997. [42] F. Kara and H. Kaya, ‘‘Error probability analysis of non-orthogonal multiple access with channel estimation errors,’’ in Proc. IEEE Int. Black Sea Conf. Commun. Netw. (BlackSeaCom), Odyssey, Ukraine: IEEE, May 2020, pp. 1–5. [Online]. Available: https://ieeexplore. ieee.org/document/9234956 [43] F. Kara and H. Kaya, ‘‘Improved user fairness in decode-forward relay- ing non-orthogonal multiple access schemes with imperfect SIC and CSI,’’ IEEE Access, vol. 8, pp. 97540–97556, 2020. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9099559 [44] Y. Li, ‘‘Pilot-symbol-aided channel estimation for OFDM in wireless sys- tems,’’ IEEE Trans. Veh. Technol., vol. 49, no. 4, pp. 1207–1215, Jul. 2000. [45] S. Gecgel, C. Goztepe, and G. K. Kurt, ‘‘Transmit antenna selection for large-scale MIMO GSM with machine learning,’’ IEEE Wireless Commun. Lett., vol. 9, no. 1, pp. 113–116, Jan. 2020. [46] Y. He, J. Zhang, S. Jin, C.-K. Wen, and G. Y. Li, ‘‘Model-driven DNN decoder for turbo codes: Design, simulation, and experimen- tal results,’’ IEEE Trans. Commun., vol. 68, no. 10, pp. 6127–6140, Oct. 2020. [47] H. Ye, G. Y. Li, and B.-H.-F. Juang, ‘‘Deep learning based End- to-End wireless communication systems without pilots,’’ IEEE Trans. Cognit. Commun. Netw., early access, Feb. 23, 2021, doi: 10.1109/ TCCN.2021.3061464. [48] T. Hou, Y. Liu, Z. Song, X. Sun, Y. Chen, and L. Hanzo, ‘‘Reconfigurable intelligent surface aided NOMA networks,’’ IEEE J. Sel. Areas Commun., vol. 38, no. 11, pp. 2575–2588, Nov. 2020. [49] J. Guo, X. Zhou, S. Durrani, and H. Yanikomeroglu, ‘‘Design of non-orthogonal multiple access enhanced backscatter communication,’’ IEEE Trans. Wireless Commun., vol. 17, no. 10, pp. 6837–6852, Oct. 2018. [50] E. Bedeer, M. H. Ahmed, and H. Yanikomeroglu, ‘‘A very low complexity successive symbol-by-symbol sequence estimator for faster-than-Nyquist signaling,’’ IEEE Access, vol. 5, pp. 7414–7422, 2017. VOLUME 9, 2021 61851
  • 53. A. Emir et al.: DL Empowered Semi-Blind Joint Detection in C-NOMA AHMET EMIR received the B.Sc. degree in electronics and communications engineering from Kocaeli University, Turkey, in 2007, and the M.Sc. degree in electrical and electronics engineering from Zonguldak Bülent Ecevit University, Turkey, in 2014, where he is currently pursuing the Ph.D. degree in electrical and electronics engineering. Since 2012, he has been working with the Dis- tance Education Research and Application Center (DERAC), Zonguldak Bülent Ecevit University, as a Lecturer. His research interests include NOMA and machine learning in physical layer. FERDI KARA (Member, IEEE) received the B.Sc. degree (Hons.) in electronics and communica- tion engineering from Suleyman Demirel Univer- sity, Turkey, in 2011, and the M.Sc. and Ph.D. degrees in electrical and electronics engineer- ing from Zonguldak Bulent Ecevit University, Turkey, in 2015 and 2019, respectively. Since 2011, he has been working with the Wireless Communication Technologies Research Labora- tory (WCTLab), where he is currently a Senior Researcher. He is also a Postdoctoral Fellow with the Department of Systems and Computer Engineering, Carleton University, Ottawa, ON, Canada. His research interests include wireless communications specified with NOMA, MIMO/RIS/LIS systems, cooperative communication, index modulations, energy harvesting, faster than Nyquist signaling, aerial net- works, and machine learning algorithms in communication. He was awarded the 2020 Premium Award for Best Paper in IET Communications, and the Exemplary Reviewer Certificate from the IEEE Communications Letters, in 2019 and 2020. He serves as an Editor for Physical Communication (Elsevier). HAKAN KAYA received the B.Sc., M.Sc., and Ph.D. degrees in electrical and electronics engi- neering from Zonguldak Bülent Ecevit University, Turkey, in 2007, 2010, and 2015, respectively. Since 2015, he has been working with Zonguldak Bülent Ecevit University as an Assistant Profes- sor, from 2015 to 2020, where he is currently an Associate Professor. He is also the Head of the Wireless Communication Technologies Research Laboratory (WCTLab). His research interests include cooperative communication, NOMA, turbo coding, and machine learning in physical layer communication. He was awarded the 2020 Pre- mium Award for Best Paper in IET Communications. HALIM YANIKOMEROGLU (Fellow, IEEE) is currently a Professor with the Department of Sys- tems and Computer Engineering, Carleton Uni- versity, Ottawa, ON, Canada. His current research interest includes many aspects of 5G/6G wireless networks. His collaborative research with industry has resulted in 37 granted patents. He is a Fel- low of the Engineering Institute of Canada (EIC) and the Canadian Academy of Engineering (CAE). He received several awards for his research, teach- ing, and service, including the IEEE Communications Society Wireless Communications Technical Committee Recognition Award, in 2018, and the IEEE Vehicular Technology Society Stuart Meyer Memorial Award, in 2020. He was the Technical Program Chair/Co-Chair of WCNC 2004, Atlanta, WCNC 2008, Las Vegas, and WCNC 2014, Istanbul, and the General Chair of IEEE VTC 2010-Fall, Ottawa, and VTC 2017-Fall, Toronto. He has also served as the Chair for the IEEE’s Technical Committee on Personal Communications. He is serving as the Chair for the IEEE Wireless Commu- nications and Networking Conference (WCNC) Steering Committee. He is also a Distinguished Speaker of IEEE Communications Society and IEEE Vehicular Technology Society. 61852 VOLUME 9, 2021