SlideShare a Scribd company logo
1 of 8
Download to read offline
TELKOMNIKA, Vol.16, No.5, October 2018, pp. 1966~1973
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v16i5.9823  1966
Received May 7, 2018; Revised June 23, 2018; Accepted July 16, 2018
Exact Outage Performance Analysis of Amplify-and-
forward-aware Cooperative NOMA
Dinh-Thuan Do*
1
, Tu-Trinh T. Nguyen
2
1
Wireless Communications Research Group, Ton Duc Thang University, Ho Chi Minh City, Vietnam
2
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City, Vietnam
*Corresponding author, e-mail: dodinhthuan@tdt.edu.vn
1
, tutrinhamber@gmail.com
2
Abstract
In this paper, new radio access scheme that combines Amplify-and-Forward (AF) relaying
protocol and non-orthogonal multiple access (NOMA) system is introduced. In particular, different
scenarios for fixed power allocation scheme is investigated. In addition, the outage probability of both weak
and strong user is derived and provided in closed-form expressions. Such outage is investigated in high
SNR scenario and comparison performance between these NOMA scenarios is introduced. Numerical
simulations are offered to clarify the outage performance of the considered scheme if varying several
parameters in the existing schemes to verify the derived formulas.
Keywords: cooperative non-orthogonal multiple access, amplify-and-forward (AF), outage probability.
Copyright © 2018 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
As one favorable technology in future fifth-generation (5G) wireless networks, non-
orthogonal multiple access (NOMA) has been proposed to increase spectral efficiency [1]. By
permitting multiple users served in the same time, frequency or code domain, spectral efficiency
and user fairness are improved in NOMA compared with orthogonal multiple access (OMA). In
NOMA, the transmitter superposes multiple users’ messages and the receivers deploys
successive interference cancellation (SIC) to distinct the mixture signals in the power
domain [2]. In [3], the system performance regarding outage probability (OP) and ergodic sum
rate (ESR) was studied in typical single-hop NOMA transmission. The power allocation with
max-min fairness criterion is investigate in [4]. Recently, large-scale underlay cognitive radio
(CR) networks is deployed in NOMA [5].
The fixed relaying and adaptive relaying schemes have been suggested to implement
cooperative communication. In relaying networks, two well- known cooperative relaying
protocols are studied, namely amplify forward (AF) and decode forward (DF) [6, 7]. By AF
protocols, received signal from the source is amplified to forward to the destination, while the
received signal in DF protocols need be first decoded, then re-encoded to forward to the
destination. The author in [8] presented hardware impairment as important impact on system
performance of such relaying scheme.
Formerly, superposition coding is proposed in wireless network and currently it is
named as NOMA. Such scheme improves the throughput of a broadcast/multicast system and
efficient broadcasting is achieved. Additionally, the influence of user coupling on the
performance in NOMA is investigated [9], in which both the fixed power distribution assisted
NOMA (F-NOMA) and cognitive radio assisted NOMA (CR-NOMA) systems were considered in
term of the outage performance.
Furthermore, the outage balancing among users was investigated by deploying user
grouping and decoding order selection [10]. In particular, the optimal decoding order and power
distribution in closed-form formula for downlink NOMA were performed. In [11], only feed back
one bit of its channel state information (CSI) to a base station (BS) is considered in term of
outage behavior of each NOMA user in downlink NOMA. As advantage of such model as
providing higher fairness for multiple users, it lead to NOMA with better performance as
comparison with conventional opportunistic one-bit feedback. In order to increase the specific
data rate, the wireless powered communication networks (WPCN) scheme is deployed with
NOMA uplink system in [12]. By using the harvested energy [13,14] in the first time slot, the
TELKOMNIKA ISSN: 1693-6930 
Exact Outage Performance Analysis of Amplify-.... (Dinh-Thuan Do)
1967
strong users in NOMA can be forward signal to the weak users’ messages in the second time
slot in case of using half-duplex (HD) scheme and other relaying networks [15-17] can be
depoyed in NOMA. Motivated by above analysis in [9], this paper presents a fixed power
allocation scheme to show outage performance of separated users in the NOMA scheme in
case of AF scheme is deployed.
2. System model and Outage performance analysis
2.1. System model
We consider a downlink cooperative NOMA scenario consisting of one base station
denoted as BS, one relay R and twi users (i.e., the nearby user D2 and far user D1). The
Amplify-and-Forward (AF) protocol is employed at each relay and only one relay is selected to
assist BS conveying the information to the NOMAusers in each time slot. All wireless channels
in the considered scenario are assumed to be independent non-selective block Rayleigh fading
and are disturbed by additive white Gaussian noise with mean power 2
 . The wireless channel
1 2(0,1), (0,1), (0,1),h CN g CN g CN denote the complex channel coefficient of BS-R, R-D1,
R-D2, respectively. In principle of NOMA, two users are classified into the nearby user and far
user by their quality of service (QoS) not sorted by their channel conditions. In this case, we
assume transmit power at relay and the BS is the same. System model of AF-NOMA as shown
in Figure 1.
Figure 1. System model of AF-NOMA
Based on the aforementioned assumptions, the observation at the relay R is given by
 1 1 2 2R ry h a Px a Px w   (1)
where ,r dw w are additive white Gaussian noise terms with variance 2
 , 1 2,x x are the
normalized signal for D1, D2, respectively. It is assumed that    2 2
1 2 1E x E x  , 1 2,a a are
power allocation factors. To stipulate better fairness between the users, we assume that 1 2a a
satisfying 1 2 1a a  . Using AF scheme, the amplify gain is defined by
2 2
1
P h




(2)
In the second phase, the received signal at user D1 is
 1 1 1 1 2 2 ,D r dy Pg h a Px a Px w w     
  (3)
Similarly, the received signal at user D2 is given by
 ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 5, October 2018: 1966-1973
1968
 2 2 1 1 2 2 2D r dy Pg a Px a Px h Pg w w     (4)
To evaluate system performance, we first consider the received signal to interference and noise
ratio (SINR) at D1 to detect 1x is given by
22
1 1
1
2 22
1 2 1
2
2 2 1
a h g
h g a h g


  

  
(5)
In which, we denote 2
P


 as signal to noise ratio (SNR) at the BS. By considering in SIC is
also invoked by D2 and the received SINR at D2 to detect 1x is given by
2 22
1 2
2, 1 2 2 2 22
2 2 2 1
x
a h g
h g a h g


  

  
(6)
Then the received SINR at D2 to detect its own information is given by
2 22
2 2
2, 2 2 2
2 1
x
a h g
h g


 

 
(7)
Remark 1: With regard to optimizing of power allocation can be studied to obtain better
performance as further work considered in our next papers. However, such computation of
power allocation needs more complexity in signal processing as overhead information of power
allocation must be known to control power associated with each users.
2.2. Outage performance analysis
In this section, we perform analysis on the performance of AF-NOMA scheme in terms
of outage probability for several signal processing cases. To make its convenient in analysis,
this paper presents exact expressions for the outage probability. In order to reduce the
computation complexity, a tight lower bound for the outage probability is provided in the high-
SNR regime to better understand the behavior of the network.
In general, an outage event occurs at the strong or the weak user when the user fails to
decode its own signal. In this section, we denote the threshold SNR as , 1,2i i  . Based on the
rate requirements of the users, we can choose different values for R1 and R2, and we will
demonstrate how the R1 and R2 affect the outage performance in the numerical result section.
For sake of brevity, we denote 1 22 2
1 22 1, 2 1R R
e e= - = - .
2.2.1 The outage probability for detecting x1 at D1
We first consider the outage probability for detecting x1 at D1 can be expressed as
 1 1, 1 1 1PrD xOP OP    (8)
Next, it can be calculated each component of outage event as below
     
     
22
1 1
1, 1 1
2 22
1 2 1
2 2 2 2 22 2
1 1 1 1 2 1 1
2 2 2
1 1 2 1 1 1
2
Pr
2 2 1
2Pr 1
Pr 1
D x
a h g
OP
h g a h g
a h g h g a g h
g h a a h


  
     
     
 
  
    
      
 
    
(9)
TELKOMNIKA ISSN: 1693-6930 
Exact Outage Performance Analysis of Amplify-.... (Dinh-Thuan Do)
1969
In the event of  
2
1 2 1 1 0h a a     , i.e.
 
2 1
1 2 1
h
a a

 


, we have 1, 1 0D xOP  , else
 
  
 
  
 
 
 
 
1
1 2 1
2
1
1, 1 1 2
1 2 1 1
1
1 2 1 1
1
1
1 2 1 1
1 2 1 1 2 10
1
2Pr
1
exp
1
1
exp
D x
a a
h
OP g
h a a
z
z dz
z a a
t
a a t
dt
a a t a a

 
 
   
 
   

 
  
    



 
  
   
 
 
   
   
   
                  
 
 


(10)
It is obtained (10) by putting new variable as  
 
1
1 2 1 1
1 2 1
t
t
z a a z
a a

  
 

    

It can be
further manipulated as below
   
 
   
2
1 1 1 2 11
1, 1
1 2 1 1 2 1 1 2 1 1 2 10
21
exp expD x
a a t
OP dt
a a a a t a a a a
  
       
      
                  
 (11)
In final step, it can be expressed the outage event as below
    
 
  
 
1
1 2 1
2
1 1 1 2 1 1 1 1 2 1
1, 1 12 22 2
1 2 1 1 2 1
2 2
a a
D x
a a a a
OP e
a a a a

 
     
   


    
  
  
 
(12)
2.2.2 The outage probability for detecting x2 at D2
Secondly, the outage probability for detecting x2 at D2 can be expressed as
 2 2, 2 2, 1 1 2, 2 2Pr ,D x x xOP OP       (13)
Based on (6) and (7) and (12) we can find that:
2 22 2
1 2 2 2
2, 2 1 2
2 2 22
2 2 2
2 2
Pr ,
2 2 21 1
D x
a h g a h g
OP
h g a h g h g
 
 
    
 
   
      
(14)
In this paper, we approximate the
22
1 2 1
2, 1
2 22
2
2 2
2
2 2 1
x
a h g a
ah g a h g


  
 
  
in high SNR
regime when 2
1  . Therefore, it can be reduced as
22
2 21
2, 2 1 2
2
2
2
22
2 21
1 2
2
2
2
2
Pr ,
2 1
2
Pr Pr
2 1
D x
a h ga
OP
a h g
a h ga
a h g

 
 

 
 
 
   
   
             
(15)
 ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 5, October 2018: 1966-1973
1970
Firstly, we consider the first item, if 1
1
2
a
a
 we obtain 2, 2 0D xOP  , else 1
1
2
a
a
 we have
  
 
 
2 22
2 2
2, 2 2
2
2
2 2 2 22 2
2 2 2 2
2
22
2 2
2 2
Pr
2 1
Pr 1
1
Pr
D x
a h g
OP
h g
a h g h g
h
g
a h


 
   
 
  
 
  
   
   
 
  
  
 
(16)
Similarly, in the first case of 2
2 2 0a h   , it leads to following equation
2 2
2
h
a


 , outage
probability in this case calculated as 2, 2 0D xOP  . In the second case, as 2
2 2 0a h  
 
 2
2
2
2, 2
2 2
1
expD x
a
z
OP z dz
a z

 
  

 
     
 (17)
Similarly, it can be found outage probability in such as as
2 2 2 2 2
2, 2 12 2
2 2 22 2
2
exp 2 1 2 1D xOP
a a aa a
    
  
      
          
       
(18)
2.3 Outage performance at high SNR and The throughput on the outage probability
And the lower bounds of the outage probability in (11) and (17) are shown to be tight
bounds in the medium-and high-SNR regimes. At high SNR, the outage probability at D1 will
become
 
1
1 1 2
2
1, 1
a a
D xOP e

 


 (19)
At high SNR, the outage probability at D2 will become
2
2
2
2, 2
a
D xOP e




The throughput mainly depends on the outage probability. The throughput at D1 will become
 
    
 
  
 
1
1 2 1
1 1
2
1 1 1 2 1 1 1 1 2 1
12 22 2
1 2 1 1 2 1
1
1 2 2
a a
OP R
a a a a
e R
a a a a

 
     
   


 
           
        
(20)
Similarly, the throughput at D2 will become
TELKOMNIKA ISSN: 1693-6930 
Exact Outage Performance Analysis of Amplify-.... (Dinh-Thuan Do)
1971
 2 2
2 2 2 2 2
12 2
2 2 22 2
1
2
1 exp 2 1 2 1
OP R
R
a a aa a
    
  
 
                                
(21)
3. Simulation results
In this section, the outage performance of the downlink AF-NOMA network under
Rayleigh fading channel is evaluated via numerical examples to validate derived formula.
Moreover, the fixed power allocation is applied in order to further evaluation of such NOMA.
Without loss of generality, we assume the distance in each link of two-hop relaying NOMA is
normalized to unity. In the following simulations, we set 1 20.9, 0.1a a  . We denote “ana” as
analysis and “sim” as Monte-Carlo simulation results.
Figure 2 plots the outage probability of considered scheme versus SNR for a simulation
setting 1 1R  (bits/s/Hz), 2 1R  (bits/s/Hz). It can be seen that the exact analytical results and
simulation results are matched very well. In particular, it shown that as the system SNR
increases, the outage probability decreases. Another important observation is that the outage
probability for User D1 of NOMA outperforms for User D2. Note that the results related to such
outage performance resulted from power allocation for each user in NOMA.
Figure 2. Outage probability vs. the transmit SNR
In Figure 3, the outage probability versus system SNR is presented in different
threshold SNR parameters. Three cases of target rates are set as    1 2, 1,2R R  bits/s/Hz,
   1 2, 0.5,1.5R R  (bits/s/Hz). Obviously in this case, the outage probability curves match exactly
with the Monte Carlo simulation results. One can observe that adjusting the target rates of
NOMA users will affect the outage behaviors of considered scheme. As the value of target rates
increases, the outage performance will becomes worse. It is worth noting that the setting of
reasonable threshold SNR or target rate for NOMA users is prerequisite based on the specific
application requirements of different scenarios.
Figure 4 plots system outage probability versus SNR in high SNR mode. It can be
observed that the analytical results meet with that in high SNR case. In Figure 4, the outage
performance comparison in high SNR regime, where 1 1R  (bits/s/Hz), 2 1R  (bits/s/Hz). This
illustration indicates that our derived expressions are tight result for evaluation in related NOMA
networks.
Figure 5 plots system throughput versus SNR in delay-limited transmission mode.
Furthermore, the AF-based NOMA scheme for D1 outperform D2 in terms of system throughput.
Our setup is 1 1R  (bits/s/Hz), 2 2R  (bits/s/Hz). This phenomenon indicates that it is of
 ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 5, October 2018: 1966-1973
1972
significance to consider the impact of power allocation for such scheme when designing
practical cooperative NOMA systems.
Figure 3. Outage probability vs. the transmit SNR with different threshold SNR
Figure 4. Outage performance comparison in high SNR regime
Figure 5. Throughput performance vs. the transmit SNR
TELKOMNIKA ISSN: 1693-6930 
Exact Outage Performance Analysis of Amplify-.... (Dinh-Thuan Do)
1973
4. Conclusion
This paper presented a novel downlink cooperative communication system that
combines NOMA with AF relaying techniques in analytical model for outage analysis. The
proposed scheme achieves outage performance comparision under impacts of various
parameters in cooperative NOMA systems. Furthermore, impact of the transmit SNR of the
source node in cooperative relaying NOMA on the throughput is performed via simulation and
acceptable threshold can be shown to the system evaluation. The superior performance of the
proposed schemes was demonstrated by the numerical results. As a future work, it will be
interesting to investigate the user fairness problem only with relative locations of the users as in
group. More importantly, the outage probability of both strong and weak users in the system is
derived and verified by comparing numerical simulations and analytical simulation.
Acknowledgement
This research is funded by Foundation for Science and Technology Development of
Ton Duc Thang University (FOSTECT), website: http://fostect.tdt.edu.vn, under Grant
FOSTECT.2017.BR.21
References
[1] Y Saito et al. Non-orthogonal multiple access (NOMA) for cellular future radio access. Proc. IEEE
Veh. Tech. Conf, Dresden, Germany, 2013: 1-5.
[2] Islam S M R, Avazov N, Dobre O A, et al. Power-domain non-orthogonal multiple access (NOMA) in
5G systems: potentials and challenges. IEEE Communications Surveys Tutorials, 2016;(99): 1-1.
[3] Ding, Z, Yang, Z, Fan, P, HV, Poor. On the performance of nonorthogonal multiple access in 5G
systems with randomly deployed users. IEEE Signal Processing Letters, 2014; 21(12): 1501-1505.
[4] Timotheou, S, Krikidis, I. Fairness for non-orthogonal multiple access in 5G systems. IEEE Signal
Processing Letters, 2015; 22(10): 1647-1651.
[5] Y Liu, Z Ding, M Elkashlan, J Yuan. Nonorthogonal multiple access in large-scale underlay cognitive
radio networks. IEEE Trans. Veh.Technol, 2016; 65(12): 10152-10157.
[6] Dinh-Thuan Do, H-S Nguyen. A Tractable Approach to Analyze the Energy-Aware Two-way Relaying
Networks in Presence of Co-channel Interference. EURASIP Journal on Wireless Communications
and Networking, 2016:271.
[7] H-S Nguyen, A-H. Bui, Dinh-Thuan Do, M. Voznak. Imperfect Channel State Information of AF and
DF Energy Harvesting Cooperative Networks. China Communications, 2016; 13(10): 11-19.
[8] Dinh-Thuan Do. Power Switching Protocol for Two-way Relaying Network under Hardware
Impairments. Radioengineering, 2015; 24(3): 765-771.
[9] Z Ding, P Fan, H V Poor. Impact of user pairing on 5G non-orthogonal multiple-access downlink
transmissions. IEEE Trans. Veh.Technol., 2016; 65(8): 6010–6023.
[10] S Shi, L Yang, H Zhu. Outage balancing in downlink nonorthogonal multiple access with statistical
channel state information. IEEE Trans. Wireless Commun., 2016; 15(7): 4718-4731.
[11] P Xu, Y Yuan, Z Ding, X Dai, R Schober. On the outage performance of non-orthogonal multiple
access with 1-bit feedback. IEEE Trans. Wireless Commun., 2016; 15(10): 6716-6730.
[12] P D Diamantoulakis, K N Pappi, Z Ding, G K Karagiannidis. Wireless-powered communications with
non-orthogonal multiple access. IEEE Trans. Wireless Commun., 2016; 15(12): 8422-8436.
[13] X-X Nguyen, Dinh-Thuan Do. Maximum Harvested Energy Policy in Full-Duplex Relaying Networks
with SWIPT. International Journal of Communication Systems (Wiley), 2017; 30(17).
[14] T-L Nguyen, Dinh-Thuan Do. A new look at AF two-way relaying networks: energy harvesting
architecture and impact of co-channel interference. Annals of Telecommunications. 2017; 72(11):
669-678.
[15] S Arunmozhi, G Nagarajan. Performance of Full-Duplex One-Way and Two-Way Cooperative
Relaying Networks. Indonesian Journal of Electrical Engineering and Computer Science (IJEECS).
2018; 9(2): 526-538.
[16] D-T Do. Optimal Energy Har vesting Scheme for Power Beacon-Assisted Wireless-Powered
Networks. Indonesian Journal of Electrical Engineering and Computer Science (IJEECS). 2017; 7(3):
802-808.
[17] F Obite, K M Yusof, J Din. A Mathematical Approach for Hidden Node Problem in Cognitive Radio
Networks. Telkomnika, 2017; 15(3): 1127-1136.

More Related Content

What's hot

Outage performance of downlink NOMA-aided small cell network with wireless po...
Outage performance of downlink NOMA-aided small cell network with wireless po...Outage performance of downlink NOMA-aided small cell network with wireless po...
Outage performance of downlink NOMA-aided small cell network with wireless po...journalBEEI
 
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...journalBEEI
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple AccessAhmar Hashmi
 
System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...Alexander Decker
 
Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...journalBEEI
 
Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...TELKOMNIKA JOURNAL
 
Lte phy fundamentals
Lte phy fundamentalsLte phy fundamentals
Lte phy fundamentalsderejew
 
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...ambitlick
 
Paper id 312201516
Paper id 312201516Paper id 312201516
Paper id 312201516IJRAT
 
Gsm (Part 3)
Gsm (Part 3)Gsm (Part 3)
Gsm (Part 3)Ali Usman
 
The performance of turbo codes for wireless communication systems
The performance of turbo codes for wireless communication systemsThe performance of turbo codes for wireless communication systems
The performance of turbo codes for wireless communication systemschakravarthy Gopi
 
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...theijes
 
Dcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless networkDcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless networkIJCNCJournal
 

What's hot (20)

Outage performance of downlink NOMA-aided small cell network with wireless po...
Outage performance of downlink NOMA-aided small cell network with wireless po...Outage performance of downlink NOMA-aided small cell network with wireless po...
Outage performance of downlink NOMA-aided small cell network with wireless po...
 
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple Access
 
System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...
 
Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...
 
Hn analysis
Hn analysisHn analysis
Hn analysis
 
Network coding
Network codingNetwork coding
Network coding
 
Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...
 
Lte phy fundamentals
Lte phy fundamentalsLte phy fundamentals
Lte phy fundamentals
 
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
 
H018214754
H018214754H018214754
H018214754
 
Peak to avrage power ratio
Peak to avrage power ratioPeak to avrage power ratio
Peak to avrage power ratio
 
Paper id 312201516
Paper id 312201516Paper id 312201516
Paper id 312201516
 
Fdd or tdd
Fdd or tddFdd or tdd
Fdd or tdd
 
Gsm (Part 3)
Gsm (Part 3)Gsm (Part 3)
Gsm (Part 3)
 
The performance of turbo codes for wireless communication systems
The performance of turbo codes for wireless communication systemsThe performance of turbo codes for wireless communication systems
The performance of turbo codes for wireless communication systems
 
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
 
Ch08
Ch08Ch08
Ch08
 
Dcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless networkDcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless network
 
Ch06
Ch06Ch06
Ch06
 

Similar to Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA

Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...journalBEEI
 
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksComparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksTELKOMNIKA JOURNAL
 
Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...IJECEIAES
 
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...TELKOMNIKA JOURNAL
 
Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...journalBEEI
 
Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...journalBEEI
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...nooriasukmaningtyas
 
Cooperative underlay cognitive radio assisted NOMA: secondary network improve...
Cooperative underlay cognitive radio assisted NOMA: secondary network improve...Cooperative underlay cognitive radio assisted NOMA: secondary network improve...
Cooperative underlay cognitive radio assisted NOMA: secondary network improve...TELKOMNIKA JOURNAL
 
Exploiting Outage Performance of Wireless Powered NOMA
Exploiting Outage Performance of Wireless Powered NOMAExploiting Outage Performance of Wireless Powered NOMA
Exploiting Outage Performance of Wireless Powered NOMATELKOMNIKA JOURNAL
 
Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...
Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...
Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...TELKOMNIKA JOURNAL
 
Average Channel Capacity of Amplify-and-forward MIMO/FSO Systems Over Atmosph...
Average Channel Capacity of Amplify-and-forward MIMO/FSO Systems Over Atmosph...Average Channel Capacity of Amplify-and-forward MIMO/FSO Systems Over Atmosph...
Average Channel Capacity of Amplify-and-forward MIMO/FSO Systems Over Atmosph...IJECEIAES
 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...journalBEEI
 
Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...TELKOMNIKA JOURNAL
 
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...TELKOMNIKA JOURNAL
 
Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisnooriasukmaningtyas
 
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...TELKOMNIKA JOURNAL
 
Non orthogonal multiple access
Non orthogonal multiple accessNon orthogonal multiple access
Non orthogonal multiple accessShalikramRajpoot
 
Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...TELKOMNIKA JOURNAL
 
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...ijaceeejournal
 
Intercept probability analysis in DF time switching full-duplex relaying netw...
Intercept probability analysis in DF time switching full-duplex relaying netw...Intercept probability analysis in DF time switching full-duplex relaying netw...
Intercept probability analysis in DF time switching full-duplex relaying netw...TELKOMNIKA JOURNAL
 

Similar to Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA (20)

Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...
 
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksComparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
 
Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...
 
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
 
Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...
 
Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
 
Cooperative underlay cognitive radio assisted NOMA: secondary network improve...
Cooperative underlay cognitive radio assisted NOMA: secondary network improve...Cooperative underlay cognitive radio assisted NOMA: secondary network improve...
Cooperative underlay cognitive radio assisted NOMA: secondary network improve...
 
Exploiting Outage Performance of Wireless Powered NOMA
Exploiting Outage Performance of Wireless Powered NOMAExploiting Outage Performance of Wireless Powered NOMA
Exploiting Outage Performance of Wireless Powered NOMA
 
Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...
Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...
Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...
 
Average Channel Capacity of Amplify-and-forward MIMO/FSO Systems Over Atmosph...
Average Channel Capacity of Amplify-and-forward MIMO/FSO Systems Over Atmosph...Average Channel Capacity of Amplify-and-forward MIMO/FSO Systems Over Atmosph...
Average Channel Capacity of Amplify-and-forward MIMO/FSO Systems Over Atmosph...
 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...
 
Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...
 
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
 
Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysis
 
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
 
Non orthogonal multiple access
Non orthogonal multiple accessNon orthogonal multiple access
Non orthogonal multiple access
 
Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...
 
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
 
Intercept probability analysis in DF time switching full-duplex relaying netw...
Intercept probability analysis in DF time switching full-duplex relaying netw...Intercept probability analysis in DF time switching full-duplex relaying netw...
Intercept probability analysis in DF time switching full-duplex relaying netw...
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Recently uploaded (20)

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 

Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA

  • 1. TELKOMNIKA, Vol.16, No.5, October 2018, pp. 1966~1973 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v16i5.9823  1966 Received May 7, 2018; Revised June 23, 2018; Accepted July 16, 2018 Exact Outage Performance Analysis of Amplify-and- forward-aware Cooperative NOMA Dinh-Thuan Do* 1 , Tu-Trinh T. Nguyen 2 1 Wireless Communications Research Group, Ton Duc Thang University, Ho Chi Minh City, Vietnam 2 Faculty of Electronics Technology, Industrial University of Ho Chi Minh City, Vietnam *Corresponding author, e-mail: dodinhthuan@tdt.edu.vn 1 , tutrinhamber@gmail.com 2 Abstract In this paper, new radio access scheme that combines Amplify-and-Forward (AF) relaying protocol and non-orthogonal multiple access (NOMA) system is introduced. In particular, different scenarios for fixed power allocation scheme is investigated. In addition, the outage probability of both weak and strong user is derived and provided in closed-form expressions. Such outage is investigated in high SNR scenario and comparison performance between these NOMA scenarios is introduced. Numerical simulations are offered to clarify the outage performance of the considered scheme if varying several parameters in the existing schemes to verify the derived formulas. Keywords: cooperative non-orthogonal multiple access, amplify-and-forward (AF), outage probability. Copyright © 2018 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction As one favorable technology in future fifth-generation (5G) wireless networks, non- orthogonal multiple access (NOMA) has been proposed to increase spectral efficiency [1]. By permitting multiple users served in the same time, frequency or code domain, spectral efficiency and user fairness are improved in NOMA compared with orthogonal multiple access (OMA). In NOMA, the transmitter superposes multiple users’ messages and the receivers deploys successive interference cancellation (SIC) to distinct the mixture signals in the power domain [2]. In [3], the system performance regarding outage probability (OP) and ergodic sum rate (ESR) was studied in typical single-hop NOMA transmission. The power allocation with max-min fairness criterion is investigate in [4]. Recently, large-scale underlay cognitive radio (CR) networks is deployed in NOMA [5]. The fixed relaying and adaptive relaying schemes have been suggested to implement cooperative communication. In relaying networks, two well- known cooperative relaying protocols are studied, namely amplify forward (AF) and decode forward (DF) [6, 7]. By AF protocols, received signal from the source is amplified to forward to the destination, while the received signal in DF protocols need be first decoded, then re-encoded to forward to the destination. The author in [8] presented hardware impairment as important impact on system performance of such relaying scheme. Formerly, superposition coding is proposed in wireless network and currently it is named as NOMA. Such scheme improves the throughput of a broadcast/multicast system and efficient broadcasting is achieved. Additionally, the influence of user coupling on the performance in NOMA is investigated [9], in which both the fixed power distribution assisted NOMA (F-NOMA) and cognitive radio assisted NOMA (CR-NOMA) systems were considered in term of the outage performance. Furthermore, the outage balancing among users was investigated by deploying user grouping and decoding order selection [10]. In particular, the optimal decoding order and power distribution in closed-form formula for downlink NOMA were performed. In [11], only feed back one bit of its channel state information (CSI) to a base station (BS) is considered in term of outage behavior of each NOMA user in downlink NOMA. As advantage of such model as providing higher fairness for multiple users, it lead to NOMA with better performance as comparison with conventional opportunistic one-bit feedback. In order to increase the specific data rate, the wireless powered communication networks (WPCN) scheme is deployed with NOMA uplink system in [12]. By using the harvested energy [13,14] in the first time slot, the
  • 2. TELKOMNIKA ISSN: 1693-6930  Exact Outage Performance Analysis of Amplify-.... (Dinh-Thuan Do) 1967 strong users in NOMA can be forward signal to the weak users’ messages in the second time slot in case of using half-duplex (HD) scheme and other relaying networks [15-17] can be depoyed in NOMA. Motivated by above analysis in [9], this paper presents a fixed power allocation scheme to show outage performance of separated users in the NOMA scheme in case of AF scheme is deployed. 2. System model and Outage performance analysis 2.1. System model We consider a downlink cooperative NOMA scenario consisting of one base station denoted as BS, one relay R and twi users (i.e., the nearby user D2 and far user D1). The Amplify-and-Forward (AF) protocol is employed at each relay and only one relay is selected to assist BS conveying the information to the NOMAusers in each time slot. All wireless channels in the considered scenario are assumed to be independent non-selective block Rayleigh fading and are disturbed by additive white Gaussian noise with mean power 2  . The wireless channel 1 2(0,1), (0,1), (0,1),h CN g CN g CN denote the complex channel coefficient of BS-R, R-D1, R-D2, respectively. In principle of NOMA, two users are classified into the nearby user and far user by their quality of service (QoS) not sorted by their channel conditions. In this case, we assume transmit power at relay and the BS is the same. System model of AF-NOMA as shown in Figure 1. Figure 1. System model of AF-NOMA Based on the aforementioned assumptions, the observation at the relay R is given by  1 1 2 2R ry h a Px a Px w   (1) where ,r dw w are additive white Gaussian noise terms with variance 2  , 1 2,x x are the normalized signal for D1, D2, respectively. It is assumed that    2 2 1 2 1E x E x  , 1 2,a a are power allocation factors. To stipulate better fairness between the users, we assume that 1 2a a satisfying 1 2 1a a  . Using AF scheme, the amplify gain is defined by 2 2 1 P h     (2) In the second phase, the received signal at user D1 is  1 1 1 1 2 2 ,D r dy Pg h a Px a Px w w        (3) Similarly, the received signal at user D2 is given by
  • 3.  ISSN: 1693-6930 TELKOMNIKA Vol. 16, No. 5, October 2018: 1966-1973 1968  2 2 1 1 2 2 2D r dy Pg a Px a Px h Pg w w     (4) To evaluate system performance, we first consider the received signal to interference and noise ratio (SINR) at D1 to detect 1x is given by 22 1 1 1 2 22 1 2 1 2 2 2 1 a h g h g a h g          (5) In which, we denote 2 P    as signal to noise ratio (SNR) at the BS. By considering in SIC is also invoked by D2 and the received SINR at D2 to detect 1x is given by 2 22 1 2 2, 1 2 2 2 22 2 2 2 1 x a h g h g a h g          (6) Then the received SINR at D2 to detect its own information is given by 2 22 2 2 2, 2 2 2 2 1 x a h g h g        (7) Remark 1: With regard to optimizing of power allocation can be studied to obtain better performance as further work considered in our next papers. However, such computation of power allocation needs more complexity in signal processing as overhead information of power allocation must be known to control power associated with each users. 2.2. Outage performance analysis In this section, we perform analysis on the performance of AF-NOMA scheme in terms of outage probability for several signal processing cases. To make its convenient in analysis, this paper presents exact expressions for the outage probability. In order to reduce the computation complexity, a tight lower bound for the outage probability is provided in the high- SNR regime to better understand the behavior of the network. In general, an outage event occurs at the strong or the weak user when the user fails to decode its own signal. In this section, we denote the threshold SNR as , 1,2i i  . Based on the rate requirements of the users, we can choose different values for R1 and R2, and we will demonstrate how the R1 and R2 affect the outage performance in the numerical result section. For sake of brevity, we denote 1 22 2 1 22 1, 2 1R R e e= - = - . 2.2.1 The outage probability for detecting x1 at D1 We first consider the outage probability for detecting x1 at D1 can be expressed as  1 1, 1 1 1PrD xOP OP    (8) Next, it can be calculated each component of outage event as below             22 1 1 1, 1 1 2 22 1 2 1 2 2 2 2 22 2 1 1 1 1 2 1 1 2 2 2 1 1 2 1 1 1 2 Pr 2 2 1 2Pr 1 Pr 1 D x a h g OP h g a h g a h g h g a g h g h a a h                                          (9)
  • 4. TELKOMNIKA ISSN: 1693-6930  Exact Outage Performance Analysis of Amplify-.... (Dinh-Thuan Do) 1969 In the event of   2 1 2 1 1 0h a a     , i.e.   2 1 1 2 1 h a a      , we have 1, 1 0D xOP  , else                   1 1 2 1 2 1 1, 1 1 2 1 2 1 1 1 1 2 1 1 1 1 1 2 1 1 1 2 1 1 2 10 1 2Pr 1 exp 1 1 exp D x a a h OP g h a a z z dz z a a t a a t dt a a t a a                                                                                (10) It is obtained (10) by putting new variable as     1 1 2 1 1 1 2 1 t t z a a z a a              It can be further manipulated as below           2 1 1 1 2 11 1, 1 1 2 1 1 2 1 1 2 1 1 2 10 21 exp expD x a a t OP dt a a a a t a a a a                                       (11) In final step, it can be expressed the outage event as below             1 1 2 1 2 1 1 1 2 1 1 1 1 2 1 1, 1 12 22 2 1 2 1 1 2 1 2 2 a a D x a a a a OP e a a a a                             (12) 2.2.2 The outage probability for detecting x2 at D2 Secondly, the outage probability for detecting x2 at D2 can be expressed as  2 2, 2 2, 1 1 2, 2 2Pr ,D x x xOP OP       (13) Based on (6) and (7) and (12) we can find that: 2 22 2 1 2 2 2 2, 2 1 2 2 2 22 2 2 2 2 2 Pr , 2 2 21 1 D x a h g a h g OP h g a h g h g                       (14) In this paper, we approximate the 22 1 2 1 2, 1 2 22 2 2 2 2 2 2 1 x a h g a ah g a h g           in high SNR regime when 2 1  . Therefore, it can be reduced as 22 2 21 2, 2 1 2 2 2 2 22 2 21 1 2 2 2 2 2 Pr , 2 1 2 Pr Pr 2 1 D x a h ga OP a h g a h ga a h g                                   (15)
  • 5.  ISSN: 1693-6930 TELKOMNIKA Vol. 16, No. 5, October 2018: 1966-1973 1970 Firstly, we consider the first item, if 1 1 2 a a  we obtain 2, 2 0D xOP  , else 1 1 2 a a  we have        2 22 2 2 2, 2 2 2 2 2 2 2 22 2 2 2 2 2 2 22 2 2 2 2 Pr 2 1 Pr 1 1 Pr D x a h g OP h g a h g h g h g a h                                     (16) Similarly, in the first case of 2 2 2 0a h   , it leads to following equation 2 2 2 h a    , outage probability in this case calculated as 2, 2 0D xOP  . In the second case, as 2 2 2 0a h      2 2 2 2, 2 2 2 1 expD x a z OP z dz a z                 (17) Similarly, it can be found outage probability in such as as 2 2 2 2 2 2, 2 12 2 2 2 22 2 2 exp 2 1 2 1D xOP a a aa a                                   (18) 2.3 Outage performance at high SNR and The throughput on the outage probability And the lower bounds of the outage probability in (11) and (17) are shown to be tight bounds in the medium-and high-SNR regimes. At high SNR, the outage probability at D1 will become   1 1 1 2 2 1, 1 a a D xOP e       (19) At high SNR, the outage probability at D2 will become 2 2 2 2, 2 a D xOP e     The throughput mainly depends on the outage probability. The throughput at D1 will become               1 1 2 1 1 1 2 1 1 1 2 1 1 1 1 2 1 12 22 2 1 2 1 1 2 1 1 1 2 2 a a OP R a a a a e R a a a a                                       (20) Similarly, the throughput at D2 will become
  • 6. TELKOMNIKA ISSN: 1693-6930  Exact Outage Performance Analysis of Amplify-.... (Dinh-Thuan Do) 1971  2 2 2 2 2 2 2 12 2 2 2 22 2 1 2 1 exp 2 1 2 1 OP R R a a aa a                                            (21) 3. Simulation results In this section, the outage performance of the downlink AF-NOMA network under Rayleigh fading channel is evaluated via numerical examples to validate derived formula. Moreover, the fixed power allocation is applied in order to further evaluation of such NOMA. Without loss of generality, we assume the distance in each link of two-hop relaying NOMA is normalized to unity. In the following simulations, we set 1 20.9, 0.1a a  . We denote “ana” as analysis and “sim” as Monte-Carlo simulation results. Figure 2 plots the outage probability of considered scheme versus SNR for a simulation setting 1 1R  (bits/s/Hz), 2 1R  (bits/s/Hz). It can be seen that the exact analytical results and simulation results are matched very well. In particular, it shown that as the system SNR increases, the outage probability decreases. Another important observation is that the outage probability for User D1 of NOMA outperforms for User D2. Note that the results related to such outage performance resulted from power allocation for each user in NOMA. Figure 2. Outage probability vs. the transmit SNR In Figure 3, the outage probability versus system SNR is presented in different threshold SNR parameters. Three cases of target rates are set as    1 2, 1,2R R  bits/s/Hz,    1 2, 0.5,1.5R R  (bits/s/Hz). Obviously in this case, the outage probability curves match exactly with the Monte Carlo simulation results. One can observe that adjusting the target rates of NOMA users will affect the outage behaviors of considered scheme. As the value of target rates increases, the outage performance will becomes worse. It is worth noting that the setting of reasonable threshold SNR or target rate for NOMA users is prerequisite based on the specific application requirements of different scenarios. Figure 4 plots system outage probability versus SNR in high SNR mode. It can be observed that the analytical results meet with that in high SNR case. In Figure 4, the outage performance comparison in high SNR regime, where 1 1R  (bits/s/Hz), 2 1R  (bits/s/Hz). This illustration indicates that our derived expressions are tight result for evaluation in related NOMA networks. Figure 5 plots system throughput versus SNR in delay-limited transmission mode. Furthermore, the AF-based NOMA scheme for D1 outperform D2 in terms of system throughput. Our setup is 1 1R  (bits/s/Hz), 2 2R  (bits/s/Hz). This phenomenon indicates that it is of
  • 7.  ISSN: 1693-6930 TELKOMNIKA Vol. 16, No. 5, October 2018: 1966-1973 1972 significance to consider the impact of power allocation for such scheme when designing practical cooperative NOMA systems. Figure 3. Outage probability vs. the transmit SNR with different threshold SNR Figure 4. Outage performance comparison in high SNR regime Figure 5. Throughput performance vs. the transmit SNR
  • 8. TELKOMNIKA ISSN: 1693-6930  Exact Outage Performance Analysis of Amplify-.... (Dinh-Thuan Do) 1973 4. Conclusion This paper presented a novel downlink cooperative communication system that combines NOMA with AF relaying techniques in analytical model for outage analysis. The proposed scheme achieves outage performance comparision under impacts of various parameters in cooperative NOMA systems. Furthermore, impact of the transmit SNR of the source node in cooperative relaying NOMA on the throughput is performed via simulation and acceptable threshold can be shown to the system evaluation. The superior performance of the proposed schemes was demonstrated by the numerical results. As a future work, it will be interesting to investigate the user fairness problem only with relative locations of the users as in group. More importantly, the outage probability of both strong and weak users in the system is derived and verified by comparing numerical simulations and analytical simulation. Acknowledgement This research is funded by Foundation for Science and Technology Development of Ton Duc Thang University (FOSTECT), website: http://fostect.tdt.edu.vn, under Grant FOSTECT.2017.BR.21 References [1] Y Saito et al. Non-orthogonal multiple access (NOMA) for cellular future radio access. Proc. IEEE Veh. Tech. Conf, Dresden, Germany, 2013: 1-5. [2] Islam S M R, Avazov N, Dobre O A, et al. Power-domain non-orthogonal multiple access (NOMA) in 5G systems: potentials and challenges. IEEE Communications Surveys Tutorials, 2016;(99): 1-1. [3] Ding, Z, Yang, Z, Fan, P, HV, Poor. On the performance of nonorthogonal multiple access in 5G systems with randomly deployed users. IEEE Signal Processing Letters, 2014; 21(12): 1501-1505. [4] Timotheou, S, Krikidis, I. Fairness for non-orthogonal multiple access in 5G systems. IEEE Signal Processing Letters, 2015; 22(10): 1647-1651. [5] Y Liu, Z Ding, M Elkashlan, J Yuan. Nonorthogonal multiple access in large-scale underlay cognitive radio networks. IEEE Trans. Veh.Technol, 2016; 65(12): 10152-10157. [6] Dinh-Thuan Do, H-S Nguyen. A Tractable Approach to Analyze the Energy-Aware Two-way Relaying Networks in Presence of Co-channel Interference. EURASIP Journal on Wireless Communications and Networking, 2016:271. [7] H-S Nguyen, A-H. Bui, Dinh-Thuan Do, M. Voznak. Imperfect Channel State Information of AF and DF Energy Harvesting Cooperative Networks. China Communications, 2016; 13(10): 11-19. [8] Dinh-Thuan Do. Power Switching Protocol for Two-way Relaying Network under Hardware Impairments. Radioengineering, 2015; 24(3): 765-771. [9] Z Ding, P Fan, H V Poor. Impact of user pairing on 5G non-orthogonal multiple-access downlink transmissions. IEEE Trans. Veh.Technol., 2016; 65(8): 6010–6023. [10] S Shi, L Yang, H Zhu. Outage balancing in downlink nonorthogonal multiple access with statistical channel state information. IEEE Trans. Wireless Commun., 2016; 15(7): 4718-4731. [11] P Xu, Y Yuan, Z Ding, X Dai, R Schober. On the outage performance of non-orthogonal multiple access with 1-bit feedback. IEEE Trans. Wireless Commun., 2016; 15(10): 6716-6730. [12] P D Diamantoulakis, K N Pappi, Z Ding, G K Karagiannidis. Wireless-powered communications with non-orthogonal multiple access. IEEE Trans. Wireless Commun., 2016; 15(12): 8422-8436. [13] X-X Nguyen, Dinh-Thuan Do. Maximum Harvested Energy Policy in Full-Duplex Relaying Networks with SWIPT. International Journal of Communication Systems (Wiley), 2017; 30(17). [14] T-L Nguyen, Dinh-Thuan Do. A new look at AF two-way relaying networks: energy harvesting architecture and impact of co-channel interference. Annals of Telecommunications. 2017; 72(11): 669-678. [15] S Arunmozhi, G Nagarajan. Performance of Full-Duplex One-Way and Two-Way Cooperative Relaying Networks. Indonesian Journal of Electrical Engineering and Computer Science (IJEECS). 2018; 9(2): 526-538. [16] D-T Do. Optimal Energy Har vesting Scheme for Power Beacon-Assisted Wireless-Powered Networks. Indonesian Journal of Electrical Engineering and Computer Science (IJEECS). 2017; 7(3): 802-808. [17] F Obite, K M Yusof, J Din. A Mathematical Approach for Hidden Node Problem in Cognitive Radio Networks. Telkomnika, 2017; 15(3): 1127-1136.