SlideShare a Scribd company logo
1 of 7
Download to read offline
TELKOMNIKA, Vol.17, No.6, December 2019, pp.2697~2703
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v17i6.12218 ◼ 2697
Received January 8, 2019; Revised February 19, 2019; Accepted March 12, 2019
Wireless power transfer enabled NOMA relay systems:
two SIC modes and performance evaluation
Dinh-Thuan Do*1
, Chi-Bao Le2
, Hong-Nhu Nguyen3
, Tam Nguyen Kieu4
, Si-Phu Le5
,
Ngoc-Long Nguyen6
, Nhat-Tien Nguyen7
, Miroslav Voznak8
1
Wireless Communications Research Group, Ton Duc Thang University, Ho Chi Minh City, Vietnam
1
Faculty of Electrical & Electronics Engineering, Ton Duc Thang University,
Ho Chi Minh City, Vietnam
2
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City, Vietnam
3,4,5,6,7,8
Faculty of Electrical Engineering and Computer Science,
VSB-Technical University of Ostrava, Czech Republic
*Corresponding author, e-mail: dodinhthuan@tdtu.edu.vn
Abstract
In this study, we deploy design and performance analysis in new system model using a relaying
model, energy harvesting, and non-orthogonal multi-access (NOMA) network. It is called such topology as
wireless powered NOMA relaying (WPNR). In the proposed model, NOMA will be investigated in two
cases including single successive interference cancellation (SIC) and dual SIC. Moreover,
the simultaneous wireless information and power transfer (SWIPT) technology can be employed to feed
energy to relays who intend to serve far NOMA users. In particular, exact outage probability expressions
are provided to performance evaluation. The results from the simulations are used to demonstrate
the outage performance of the proposed model in comparison with the current models and to verify correct
of derived expressions.
Keywords: energy harvesting, non-orthogonal multiple access, outage probability
Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
The fifth generation (5G) of mobile communication networks is considered as
a progressive form of the fourth generation (4G) networks with many tremendous functions like
internet-of-thing (IoT) and cloud-based applications in [1, 2]. These modern services lead to
challenging requirements such as faster data rates, lower suspension, wider connectivity and
better spectral and energy impact. Consequently, in order to meet these demands, a range of
modern techniques used as a new technological tool to access NOMA may be a very potential
selection for the 5G network since it complies with all the specifications for spectral impact,
massive connectivity, user fairness and low suspension as mentioned in [3]. On the other hand,
when NOMA utilizes the energy domain, many different users will be accessed at the same
time, in terms of frequency, time and code according to their own channel conditions. Whereas
high power transmission rates will be selected for users with poor channel conditions, users with
better channel conditions can use lower power levels. As a result, NOMA requires multiple
communication notes at the base station superposition for receivers using superposition coding
(SC) technique. With SIC technology, NOMA users eliminate all weaker ones’ communication
notes and consider the stronger users’ notes as an intervention to decipher the own note in [4].
The active strong users (SU) can employ the weaker users' (WU) notes to transfer WU’s
notes and increase the network security which are considered as the collaborative NOMA
models in [5, 6].
In recent times, SWIPT has been suggested as a potential technique that can extend
the working time of some devices such as energy-limited devices, energy-limited sensors, IoT
devices, etc. SWIPT can endure terminals with traditional wires and considerably expand its spare
time. For that reason, SWIPT is considered a favorable technique for energy limited networks.
In most recent studies, SWIPT in information systems has implemented in centralized antenna
systems (CAS). There has been concentration on extracting the maximum beam-forming energy
splitting SWIPT to take advantage of focusing on a remote field electromagnetic radiation as
regards in [7–10]. By combining relaying network with NOMA, cooperative NOMA has well studied
◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 6, December 2019: 2697-2703
2698
in [11–15]. In [13], the authors combine SWIPT with NOMA network for existing SUs to transmit
WUs notes because there is no necessity to use energy for this cooperation. In the meantime, in
order to increase the individual data rate, the wireless powered communication networks (WPCN)
technology was combined with NOMA uplink network [14]. On the other hand, in [15], NOMA is
examined in term of energy effects in WPC systems. Additionally, in [16], the downlink of NOMA is
researched together with SWIPT (rather than WPC). Nevertheless, SWIPT is only adjusted by
close users and remote users are overwhelmed. It is shown that on-off power splitting (OPS) as
a special case of dynamic power splitting (DPS) which can obtain the maximum rate area in such
design. Therefore, the outage probability and the diversity degree are extracted for the downlink
cooperative NOMA where SWIPT is only deployed at adjacent users and the static power splitting
(SPS) as a specific situation of OPS. In [17], NOMA security is explored attentively. In particular,
an artificial noise-aided beam-forming design issue is investigated to provide the high security
level of a multiple-input single-output NOMA SWIPT network. EH mode facilitates NOMA network
with extended time of operation as limited power as recent work [18, 19]. Furthermore,
NOMA scheme can be applied in device-to-device transmission, cognitive radio or physical layer
security-aware network [20–24].
The rest of this paper is arranged as follows. The model system is demonstrated in
section 1. Section 3 introduces the entire downlink transmission of outage probability.
The simulation results are presented in section 4. After all, conclusion is taken in section 5.
2. System Model
We examine a wireless communication system as in Figure 1, with a base station
indicated by BS (assigned capability of wireless power transfer), two relays indicated by R1 and
R2 which can be approached by using NOMA and two remote users indicated by U1 and U2. It is
noted that R1 and R2 are located in the coverage area of wireless power transfer. It is supposed
that non-existence of direct link from BS with U1 and U2 and thus we need two relays to transfer
to the U1 and U2 users. These relays are self-powered devices thanks to EH (energy
harvesting). It can be found that symbol appears in the baseband whereas EH appears in
RF band. The separated Rayleigh channel factor between S and R1 and R2 is hR1
and hU2
.
At the same time, between R1 and U1 and R2 and U2 are hU1
and hU2
, respectively. Two SIC
modes are deployed here. Dual SIC is required at link BS-R1-U1 while single SIC assigned at
link BS-R2- U2.
Base Station
(BS) Relay 1
(R2)
Relay 1
(R1)
User 2
(U2)
User 1
(U1)
hR1
hU1
hR2
hU2
Energy Harvesting
Information Processing
Figure 1. System model for EH NOMA network
2.1. Downlink NOMA Relays (WPNR)
First, the BS transmits a superimposed NOMA signal (∑ 𝑥𝑖 𝑎𝑖𝑖∈1,2 ) to 𝑅1 and 𝑅2
with power distribution fractions 𝑎1 and 𝑎2, respectively, where 𝑎1 < 𝑎2 and 𝑎1
2
+ 𝑎2
2
= 1.
The received signal at relay 𝑅1 and 𝑅2, respectively is given as:
𝑦𝑅1
𝑇1
= √𝑎1 𝑃𝑥1ℎ 𝑅1
+ √𝑎2 𝑃𝑥2ℎ 𝑅1
+ 𝑛 𝑅1
(1)
TELKOMNIKA ISSN: 1693-6930 ◼
Wireless power transfer enabled NOMA relay systems: two SIC modes… (Dinh-Thuan Do)
2699
and
𝑦𝑅2
𝑇1
= √𝑎1 𝑃𝑥1ℎ 𝑅2
+ √𝑎2 𝑃𝑥2ℎ 𝑅2
+ 𝑛 𝑅2
(2)
In this case, 𝑥1 and 𝑥2 are signal intended for 𝑈1 and 𝑈2, respectively, 𝑛 𝑅1
~𝐶𝑁(0, 𝜎 𝑅1
2
)
and 𝑛 𝑅2
~𝐶𝑁(0, 𝜎 𝑅2
2
) define the additive white Gaussian noise (AWGN) at 𝑅1 and 𝑅2 with
equivalent variance 𝜎 𝑅1
2
= 𝜎 𝑅2
2
= 𝜎2
. We first compute Signal to Interference and Noise Ratio
(SINR) at 𝑅1 to detect signal 𝑥2 as
𝛾𝑥2
𝑅1
=
𝜌|ℎ 𝑅1
|
2
𝑎2
𝜌|ℎ 𝑅1
|
2
𝑎1 + 1
(3)
where 𝜌 =
𝑃
𝜎2 is the transmit Signal to Noise ratio (SNR) at 𝑅1. Then, SNR is computed at 𝑅1 to
detect signal 𝑥1 as
𝛾𝑥1
𝑅1
= 𝜌|ℎ 𝑅1
|
2
𝑎1 (4)
not the same 𝑅1, 𝑅2 deciphers 𝑥2 only when it is receives higher energy:
𝛾𝑥2
𝑅2
=
𝜌|ℎ 𝑅2
|
2
𝑎2
𝜌|ℎ 𝑅2
|
2
𝑎1 + 1
(5)
2.2. Energy Harvesting
In order to deploy the relay structure simply, the two relays in WPNR harvest energy
from the signals (xe) transmitted by the BS in the second phase with 𝐸({𝑥 𝑒}2)=1. When 𝑅1 is
closer S than 𝑅2, it harvests more energy than 𝑅2. This unbalance is verified by 𝑅1 consumes
more energy to analyze data and transmits it to 𝑈1. All of the powers harvested in this phase are
𝑃𝑅1
𝑇2
=
𝜂𝑃𝛼|ℎ 𝑅1
|
2
3
(6)
and
𝑃𝑅2
𝑇2
=
𝜂𝑃𝛼|ℎ 𝑅2
|
2
3
(7)
2.3. Downlink NOMA using Relay
During this time, the WPNR utilizes the harvested energy to transmit the symbols to
the certain users, that is, 𝑅1 transmits both 𝑥1 and 𝑥2 to 𝑈1, while 𝑅2 transmits 𝑥2 to 𝑈2,
the received signal can be obtained at and respectively as
𝑦 𝑈1
= √𝑃𝑅1
𝑇2
(√𝑏1 𝑥1 + √𝑏2 𝑥2)ℎ 𝑈1
+ 𝑛 𝑈1
(8)
where power allocation factors 𝑏1 > 𝑏2 and 𝑏1
2
+ 𝑏2
2
= 1
𝑦 𝑈2
= √𝑃𝑅2
𝑇2
𝑥2ℎ 𝑈2
+ 𝑛 𝑈2
(9)
It is worth noting that 𝑃𝑅1
and 𝑃𝑅2
are the power harvested, we obtained as (6) and (7).
The SINR at 𝑈1 to detect 𝑥1 and 𝑥2 and 𝑈2 detects 𝑥2 respectively illustrated as
𝛾𝑥1
𝑈1
=
𝑃𝑅1
𝑇2
𝑏1|ℎ 𝑈1
|
2
𝑃𝑅1
𝑇2
𝑏2|ℎ 𝑈1
|
2
+ 𝜎2
(10)
◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 6, December 2019: 2697-2703
2700
and
𝛾𝑥2
𝑈1
=
𝑃𝑅1
𝑇2
|ℎ 𝑈1
|
2
𝜎2
(11)
and
𝛾𝑥2
𝑈2
=
𝑃𝑅2
𝑇2
|ℎ 𝑈2
|
2
𝜎2
(12)
3. Outage Probability for the Entire Downlink Transmission
The outage probability in downlink transfer will occur if the transmitted data is not
performed well by the relay or by the end NOMA user. The outage probability (𝑂𝑥1
𝑈1
) of 𝑥1 at 𝑈1
is indicated as:
𝑂𝑥1
𝑈1
= 1 − (𝑂 𝑅1
𝑂 𝑈1
) (13)
in which 𝑂 𝑅1
= (1 − Pr(𝛾𝑥2
𝑅1
< 𝛾2)) (1 − Pr(𝛾𝑥1
𝑅1
< 𝛾1)), 𝑂 𝑈1
= (1 − Pr(𝛾𝑥1
𝑈1
< 𝛾1))
(1 − Pr(𝛾𝑥2
𝑈1
< 𝛾1)), 𝛾1 = 2 𝑅1 − 1 and 𝛾2 = 2 𝑅2 − 1, whereas 𝑅1 and 𝑅2 stand for the threshold
rates of 𝑥1 and 𝑥2 respectively. From (3) and (4), 𝑂 𝑅1
can be given as
𝑂 𝑅1
= (1 − Pr (
𝜌|ℎ 𝑅1
|
2
𝑎2
𝜌|ℎ 𝑅1
|
2
𝑎1 + 1
< 𝛾2)) (1 − Pr (𝜌|ℎ 𝑅1
|
2
𝑎1 < 𝛾1))
= Pr (|ℎ 𝑅1
|
2
> max (
𝛾2
𝜌(𝑎2 − 𝛾2 𝑎1)
,
𝛾1
𝜌𝑎1
) 𝜒1) = 𝑒
−
𝜒1
𝜆 𝑅1
(14)
By substituting the value of 𝑃𝑅1
𝑇2
from (6) into above expression and after some
numerical computations, we can figure out:
𝑂 𝑈1
= (1 − Pr (
𝑃𝑅1
𝑇2
|ℎ 𝑈1
|
2
(𝑏1 − 𝑏2 𝛾1)
𝜎 𝑈
2 < 𝛾1))
⏟
𝐼1
× (1 − Pr (
𝑃𝑅1
𝑇2
|ℎ 𝑈1
|
2
𝑏2
𝜎 𝑈
2 < 𝛾2))
⏟
𝐼2
(15)
we consider each component and 𝐼1 are expressed as
𝐼1 = 1 − Pr (
𝑃𝑅1
𝑇2
|ℎ 𝑈1
|
2
(𝑏1 − 𝑏2 𝛾1)
𝜎 𝑈
2 < 𝛾1) = 1 − ∫ (1 − 𝑒−
𝜃1
𝑥 ) 𝑒−𝑥
𝑑𝑥
∞
0
(16)
with the assistance of [[25], Eq (3.324.1)], the above equation can be rewritten as
𝐼1 = 2√
𝜃1
𝜆 𝑅1
𝜆 𝑈1
𝐾1 (2√
𝜃1
𝜆 𝑅1
𝜆 𝑈1
) (17)
Similar computation can be deployed for 𝐼2
𝐼2 = 1 − Pr (
𝑃𝑅1
𝑇2
|ℎ 𝑈1
|
2
𝑏2
𝜎 𝑈
2 < 𝛾2) = 1 − ∫ (1 − 𝑒−
𝜃2
𝑥 ) 𝑒−𝑥
𝑑𝑥
∞
0
(18)
TELKOMNIKA ISSN: 1693-6930 ◼
Wireless power transfer enabled NOMA relay systems: two SIC modes… (Dinh-Thuan Do)
2701
and
𝐼2 = 2√
𝜃2
𝜆 𝑅2
𝜆 𝑈1
𝐾1 (2√
𝜃2
𝜆 𝑅2
𝜆 𝑈1
) (19)
where 𝐾1(. ) is the first order Bessel function of the second kind. After replacing (14) and (15)
into (13), it can be obtained 𝑂𝑥1
𝑈1
as
𝑂 𝑈1
= 4√
𝜃1 𝜃2
𝜆 𝑅1
𝜆 𝑅2
𝜆 𝑈1
2 𝐾1 (2√
𝜃1
𝜆 𝑅1
𝜆 𝑈1
) 𝐾1 (2√
𝜃1
𝜆 𝑅1
𝜆 𝑈1
) (2-)
Now the outage probability at 𝑈2 can be calculated for 𝑥2 which can be taken as:
𝑂𝑥2
𝑈2
= 1 − 𝑂 𝑅2
𝑂 𝑈2
(21)
where 𝑂 𝑅2
= (1 − Pr(𝛾𝑥2
𝑅2
< 𝛾2)) and 𝑂 𝑈2
= (1 − Pr(𝛾𝑥2
𝑈2
< 𝛾2)). Based on (5), 𝑂 𝑅2
is given by
𝑂 𝑅2
= (1 − (
𝜌|ℎ 𝑅2
|
2
𝑎2
𝜌|ℎ 𝑅2
|
2
𝑎1 + 1
< 𝛾2)) = 𝑒
−
𝛾2
𝜌 𝜆 𝑅2(𝑎2−𝛾2 𝑎1) (22)
similarly, with the support of [[20], Eq. (3.324.1)], we can express following equation
𝑂 𝑈2
= (1 − Pr (
𝑃𝑅2
𝑇2
|ℎ 𝑈2
|
2
𝜎 𝑈
2 < 𝛾2)) = 2√
𝜃3
𝜆 𝑅2
𝜆 𝑈2
𝐾1 (2√
𝜃3
𝜆 𝑅2
𝜆 𝑈2
) (23)
by substituting (22) and (23) into (21), the respective expression of 𝑂𝑥2
𝑈2
is acquired.
4. Simulation Results
In this section, the system outage probability for such EH-NOMA is evaluated under
different target rates, transmit SNR, percentage of harvested power. We set power allocation
factors as illustrations in each figure. Figure 2 plot the outage performance is merely referred to
𝑅𝑖. However, in order to ensure a communication reliability, we should select a small value for
the target rate and the SNR is guaranteed enough high. It can be seen that higher target rates
limit outage performance. It is obvious that the NOMA networks have different power allocation
factors, and hence performance gap between two far NOMA users exist.
Figure 3 indicates that the outage probability for such EH NOMA with different power
splitting fractions for energy harvesting policy, where energy harvesting contributes to
increasing power assigned at relay. We can conclude from Figure 3 that in comparison with
three circumstances of EH-NOMA with varying power splitting fractions, the proposed model
with higher time power collecting allocation can distinguish the outage probability. Furthermore,
Figure 3 indicates that EH-NOMA can raise remarkably the outage probability at high transmit
SNR at the BS. Besides, the analytic lines adapt the Monte-Carlo simulation very well.
Figure 4 shows outage performance of EH NOMA versus transmit SNR. It is obvious
that 𝛼 has a significant effect on the outage probability of the proposed network. It is shown that
in Figure 5 the network throughput in delay-limited mode can be compared as varying target
rates. The throughput of the second NOMA user is better than that of the first user, since they
are allocated different power factors. In addition, the figures illustrate that EH-NOMA hits
the flux ceiling in the high SNR scheme. Moreover, it is important noting that the throughput is
resulted from achieved outage probably and these trends of lines can be expected.
◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 6, December 2019: 2697-2703
2702
Figure 2. Outage probability versus
the transmit 𝜌, with 𝛼 = 0.2, 𝜂 = 0.9,
𝑎1 = 𝑏2 = 0.2 and 𝑎2 = 𝑏1 = 0.8
Figure 3. Outage probability versus
the transmit 𝜌, with 𝜂 = 0.9, 𝑎1 = 𝑏2 = 0.2
and 𝑎2 = 𝑏1 = 0.8
Figure 4. Outage probability versus
the power splitting fraction 𝛼, with 𝜂 = 0.9, 𝑅1 =
𝑅2 = 1 (bps/Hz), 𝑎1 = 𝑏2 = 0.2 and 𝑎1 = 𝑏2 = 0.2
Figure 5. Throughput performance of EH NOMA
with 𝛼 = 0.2, 𝜂 = 0.9, 𝑎1 = 𝑏2 = 0.2 and
𝑎1 = 𝑏2 = 0.2
5. Conclusion
In conclusion, a modern EH NOMA model for downlinks has been introduced in this
paper. The main results attempt to distinguish two NOMA users in the same design group from
users from other groups using the NOMA concept. We propose two situations related SIC
deployment. Therefore, performance gap among two NOMA users still remains fairness
if careful selection of power allocation factors. Simulation results demonstrate that all of
the energy utilized in the model is not as much of the NOMA transmission but reasonable
performance can be achieved.
Acknowledgement
This research is funded by Foundation for Science and Technology Development of
Ton Duc Thang University (FOSTECT), website: http://fostect.tdt.edu.vn, under Grant
FOSTECT.2017.BR.21.
TELKOMNIKA ISSN: 1693-6930 ◼
Wireless power transfer enabled NOMA relay systems: two SIC modes… (Dinh-Thuan Do)
2703
References
[1] Wunder G, et al. 5GNOW: Non-orthogonal, asynchronous waveforms for future mobile applications.
IEEE Commun. Mag. 2014; 52(2): 97-105.
[2] Andrews JG, et al. What will 5G be?. IEEE J. Sel. Areas Commun. 2014; 32(6): 1065-1082.
[3] Benjebbour A, Li A, Saito Y, Kishiyama Y, Harada A, Nakamura T. System-level performance of
downlink NOMA for future LTE enhancements. Proc. IEEE Globecom Workshops (GC Wkshps).
2013: 66-70.
[4] Saito Y, Benjebbour A, Kishiyama Y, Nakamura T. Systemlevel performance evaluation of downlink
non-orthogonal multiple access (NOMA). Proc. IEEE 24th
Int. Symp. Pers. Indoor Mobile Radio
Commun. (PIMRC). 2013: 611–615.
[5] Ding Z, Peng M, Poor HV. Cooperative non-orthogonal multiple access in 5G systems. IEEE
Commun. Lett. 2015; 19(8): 1462-1465.
[6] Do NT, da Costa DB, Duong TQ, An B. A BNBF user selection scheme for NOMA-based cooperative
relaying systems with SWIPT. IEEE Commun. Lett. 2017; 21(3): 664–667.
[7] Do DT. Power Switching Protocol for Two-way Relaying Network under Hardware Impairments.
Radioengineering. 2015; 24(3): 765-771.
[8] Do DT, Nguyen HS, Voznak M, Nguyen TS. Wireless powered relaying networks under imperfect
channel state information: system performance and optimal policy for instantaneous rate.
Radioengineering, 2017; 26(3):869-877.
[9] Do DT. Energy-Aware Two-Way Relaying Networks under Imperfect Hardware: Optimal Throughput
Design and Analysis. Telecommunication Systems (Springer). 2015; 62(2): 449-459.
[10] Nguyen XX, Do DT. Optimal power allocation and throughput performance of full-duplex DF relaying
networks with wireless power transfer- ware channel. EURASIP Journal on Wireless Communications
and Networking. 2017; 2017(1): 152.
[11] Do DT, Le CB. Exploiting Outage Performance of Wireless Powered NOMA. TELKOMNIKA
Telecommunication Computing Electronics and Control. 2018; 16(5): 1907-1917.
[12] Do DT, Nguyen TTT. Exact Outage Performance Analysis of Amplify-and-Forward-Aware
Cooperative NOMA. TELKOMNIKA Telecommunication Computing Electronics and Control. 2018;
16(5): 1966-1973.
[13] Do DT, Nguyen MSV, Hoang TA. Comparison study on secrecy probability of AF-NOMA and
AF-OMA networks. TELKOMNIKA Telecommunication Computing Electronics and Control. 2019;
17(5): 2200-2207.
[14] Do DT, Vaezi M, Nguyen TL. Wireless Powered Cooperative Relaying using NOMA with Imperfect
CSI. Proc. of IEEE Globecom Workshops (GC Wkshps). Abu Dhabi. 2018: 1-6.
[15] Zewde TA, Gursoy MC. NOMA-based energy-efficient wireless powered communications. IEEE
Trans. Green Commun. and Net. 2018; 2(3): 679-692.
[16] Gong J, Chen X. Achievable rate region of non-orthogonal multiple access systems with wireless
powered decoder. IEEE J. Sel. Areas Commun. 2017; 35(12): 2846-2859.
[17] Li Y, et al. Secure beamforming in downlink MISO non-orthogonal multiple access systems. IEEE
Trans. Veh. Technol. 2017; 66(8): 7563-7567.
[18] Nguyen TL, Do DT. Exploiting Impacts of Intercell Interference on SWIPT-assisted Non-orthogonal
Multiple Access. Wireless Communications and Mobile Computing. 2018; 2018.
[19] Do DT, Le CB. Application of NOMA in Wireless System with Wireless Power Transfer Scheme:
Outage and Ergodic Capacity Performance Analysis. Sensors. 2018; 18(10): 3501.
[20] Do DT, Van Nguyen MS, Hoang TA, Voznak M. NOMA-Assisted Multiple Access Scheme for IoT
Deployment: Relay Selection Model and Secrecy Performance Improvement. Sensors. 2019;
19(3): 736.
[21] DT Do, AT Le, CB Le, BM Lee. On Exact Outage and Throughput Performance of Cognitive Radio
based Non-Orthogonal Multiple Access Networks with and Without D2D Link. Sensors. 2019;
19(15): 3314.
[22] Do DT, Thi Nguyen TT. Impacts of imperfect SIC and imperfect hardware in performance analysis on
AF non-orthogonal multiple access network. Telecommunication Systems. 2019: 1-15.
[23] Do DT, Van Nguyen MS. Device-to-device transmission modes in NOMA network with and without
Wireless Power Transfer. Computer Communications. 2019; 139: 67-77.
[24] Do DT, A.-T. Le, B. M. Lee. On Performance Analysis of Underlay Cognitive Radio-Aware Hybrid
OMA/NOMA Networks with Imperfect CSI. Electronics. 2019; 8: 819.
[25] Gradshteyn IS, Ryzhik IM. Table of integrals, series, and products. Seventh edition. Academic
press. 2007.

More Related Content

What's hot

Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
 
On the design of switched beam wideband base stations
On the design of switched beam wideband base stationsOn the design of switched beam wideband base stations
On the design of switched beam wideband base stationsmarwaeng
 
Wirleless communicatrion notes for 8th sem EC -unit 2
Wirleless communicatrion notes for 8th sem EC -unit 2Wirleless communicatrion notes for 8th sem EC -unit 2
Wirleless communicatrion notes for 8th sem EC -unit 2SURESHA V
 
Performance Analysis of Rake Receivers in IR–UWB System
Performance Analysis of Rake Receivers in IR–UWB System Performance Analysis of Rake Receivers in IR–UWB System
Performance Analysis of Rake Receivers in IR–UWB System IOSR Journals
 
Ns 2 based simulation environment for performance evaluation of umts architec...
Ns 2 based simulation environment for performance evaluation of umts architec...Ns 2 based simulation environment for performance evaluation of umts architec...
Ns 2 based simulation environment for performance evaluation of umts architec...Makhdoom Waseem Hashmi
 
Performance of symmetric and asymmetric links in wireless networks
Performance of symmetric and asymmetric links in wireless networks Performance of symmetric and asymmetric links in wireless networks
Performance of symmetric and asymmetric links in wireless networks IJECEIAES
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkijcsa
 
Analysis of near field distribution variation using awas electromagnetic code...
Analysis of near field distribution variation using awas electromagnetic code...Analysis of near field distribution variation using awas electromagnetic code...
Analysis of near field distribution variation using awas electromagnetic code...csandit
 
An enhanced energy-efficient routing protocol for wireless sensor network
An enhanced energy-efficient routing protocol for wireless sensor networkAn enhanced energy-efficient routing protocol for wireless sensor network
An enhanced energy-efficient routing protocol for wireless sensor networkIJECEIAES
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Wc & lte 4 g module 4- 2019 by prof.sv1
Wc & lte 4 g  module 4- 2019 by prof.sv1Wc & lte 4 g  module 4- 2019 by prof.sv1
Wc & lte 4 g module 4- 2019 by prof.sv1SURESHA V
 
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...IJECEIAES
 
Paper id 2720146
Paper id 2720146Paper id 2720146
Paper id 2720146IJRAT
 
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor NetworksSecured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor NetworksAssociate Professor in VSB Coimbatore
 

What's hot (18)

69 122-128
69 122-12869 122-128
69 122-128
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
74 136-143
74 136-14374 136-143
74 136-143
 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
 
On the design of switched beam wideband base stations
On the design of switched beam wideband base stationsOn the design of switched beam wideband base stations
On the design of switched beam wideband base stations
 
Wirleless communicatrion notes for 8th sem EC -unit 2
Wirleless communicatrion notes for 8th sem EC -unit 2Wirleless communicatrion notes for 8th sem EC -unit 2
Wirleless communicatrion notes for 8th sem EC -unit 2
 
Performance Analysis of Rake Receivers in IR–UWB System
Performance Analysis of Rake Receivers in IR–UWB System Performance Analysis of Rake Receivers in IR–UWB System
Performance Analysis of Rake Receivers in IR–UWB System
 
Ns 2 based simulation environment for performance evaluation of umts architec...
Ns 2 based simulation environment for performance evaluation of umts architec...Ns 2 based simulation environment for performance evaluation of umts architec...
Ns 2 based simulation environment for performance evaluation of umts architec...
 
Performance of symmetric and asymmetric links in wireless networks
Performance of symmetric and asymmetric links in wireless networks Performance of symmetric and asymmetric links in wireless networks
Performance of symmetric and asymmetric links in wireless networks
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 
Analysis of near field distribution variation using awas electromagnetic code...
Analysis of near field distribution variation using awas electromagnetic code...Analysis of near field distribution variation using awas electromagnetic code...
Analysis of near field distribution variation using awas electromagnetic code...
 
An enhanced energy-efficient routing protocol for wireless sensor network
An enhanced energy-efficient routing protocol for wireless sensor networkAn enhanced energy-efficient routing protocol for wireless sensor network
An enhanced energy-efficient routing protocol for wireless sensor network
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Wc & lte 4 g module 4- 2019 by prof.sv1
Wc & lte 4 g  module 4- 2019 by prof.sv1Wc & lte 4 g  module 4- 2019 by prof.sv1
Wc & lte 4 g module 4- 2019 by prof.sv1
 
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
 
Paper id 2720146
Paper id 2720146Paper id 2720146
Paper id 2720146
 
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor NetworksSecured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
 

Similar to Wireless power transfer enabled NOMA relay systems: two SIC modes and performance evaluation

Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...journalBEEI
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...nooriasukmaningtyas
 
Exploiting Outage Performance of Wireless Powered NOMA
Exploiting Outage Performance of Wireless Powered NOMAExploiting Outage Performance of Wireless Powered NOMA
Exploiting Outage Performance of Wireless Powered NOMATELKOMNIKA JOURNAL
 
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksComparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksTELKOMNIKA JOURNAL
 
Throughput analysis of non-orthogonal multiple access and orthogonal multipl...
Throughput analysis of non-orthogonal multiple access and  orthogonal multipl...Throughput analysis of non-orthogonal multiple access and  orthogonal multipl...
Throughput analysis of non-orthogonal multiple access and orthogonal multipl...IJECEIAES
 
Benefiting wireless power transfer scheme in power domain based multiple acce...
Benefiting wireless power transfer scheme in power domain based multiple acce...Benefiting wireless power transfer scheme in power domain based multiple acce...
Benefiting wireless power transfer scheme in power domain based multiple acce...journalBEEI
 
Study on transmission over Nakagami-m fading channel for multiple access sche...
Study on transmission over Nakagami-m fading channel for multiple access sche...Study on transmission over Nakagami-m fading channel for multiple access sche...
Study on transmission over Nakagami-m fading channel for multiple access sche...TELKOMNIKA JOURNAL
 
Full-duplex user-centric communication using non-orthogonal multiple access
Full-duplex user-centric communication using non-orthogonal multiple accessFull-duplex user-centric communication using non-orthogonal multiple access
Full-duplex user-centric communication using non-orthogonal multiple accessTELKOMNIKA JOURNAL
 
Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...journalBEEI
 
Tractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATELKOMNIKA JOURNAL
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkTELKOMNIKA JOURNAL
 
Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...TELKOMNIKA JOURNAL
 
Enhancement algorithm for reverse loop technique on planar reverse loop antenna
Enhancement algorithm for reverse loop technique on planar reverse loop antennaEnhancement algorithm for reverse loop technique on planar reverse loop antenna
Enhancement algorithm for reverse loop technique on planar reverse loop antennaTELKOMNIKA JOURNAL
 
Physical layer network coding
Physical layer network codingPhysical layer network coding
Physical layer network codingNguyen Tan
 
A low complexity distributed differential scheme based on orthogonal space t...
A low complexity distributed differential scheme based on  orthogonal space t...A low complexity distributed differential scheme based on  orthogonal space t...
A low complexity distributed differential scheme based on orthogonal space t...IJECEIAES
 
Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...TELKOMNIKA JOURNAL
 
Performance Evaluation of Centralized Reconfigurable Transmitting Power Schem...
Performance Evaluation of Centralized Reconfigurable Transmitting Power Schem...Performance Evaluation of Centralized Reconfigurable Transmitting Power Schem...
Performance Evaluation of Centralized Reconfigurable Transmitting Power Schem...TELKOMNIKA JOURNAL
 
Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...journalBEEI
 
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...ijcseit
 

Similar to Wireless power transfer enabled NOMA relay systems: two SIC modes and performance evaluation (20)

Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
 
Exploiting Outage Performance of Wireless Powered NOMA
Exploiting Outage Performance of Wireless Powered NOMAExploiting Outage Performance of Wireless Powered NOMA
Exploiting Outage Performance of Wireless Powered NOMA
 
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksComparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
 
Throughput analysis of non-orthogonal multiple access and orthogonal multipl...
Throughput analysis of non-orthogonal multiple access and  orthogonal multipl...Throughput analysis of non-orthogonal multiple access and  orthogonal multipl...
Throughput analysis of non-orthogonal multiple access and orthogonal multipl...
 
Benefiting wireless power transfer scheme in power domain based multiple acce...
Benefiting wireless power transfer scheme in power domain based multiple acce...Benefiting wireless power transfer scheme in power domain based multiple acce...
Benefiting wireless power transfer scheme in power domain based multiple acce...
 
Study on transmission over Nakagami-m fading channel for multiple access sche...
Study on transmission over Nakagami-m fading channel for multiple access sche...Study on transmission over Nakagami-m fading channel for multiple access sche...
Study on transmission over Nakagami-m fading channel for multiple access sche...
 
Full-duplex user-centric communication using non-orthogonal multiple access
Full-duplex user-centric communication using non-orthogonal multiple accessFull-duplex user-centric communication using non-orthogonal multiple access
Full-duplex user-centric communication using non-orthogonal multiple access
 
Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...
 
Tractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMA
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA network
 
Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...
 
5. 23769.pdf
5. 23769.pdf5. 23769.pdf
5. 23769.pdf
 
Enhancement algorithm for reverse loop technique on planar reverse loop antenna
Enhancement algorithm for reverse loop technique on planar reverse loop antennaEnhancement algorithm for reverse loop technique on planar reverse loop antenna
Enhancement algorithm for reverse loop technique on planar reverse loop antenna
 
Physical layer network coding
Physical layer network codingPhysical layer network coding
Physical layer network coding
 
A low complexity distributed differential scheme based on orthogonal space t...
A low complexity distributed differential scheme based on  orthogonal space t...A low complexity distributed differential scheme based on  orthogonal space t...
A low complexity distributed differential scheme based on orthogonal space t...
 
Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...
 
Performance Evaluation of Centralized Reconfigurable Transmitting Power Schem...
Performance Evaluation of Centralized Reconfigurable Transmitting Power Schem...Performance Evaluation of Centralized Reconfigurable Transmitting Power Schem...
Performance Evaluation of Centralized Reconfigurable Transmitting Power Schem...
 
Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...
 
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 

Wireless power transfer enabled NOMA relay systems: two SIC modes and performance evaluation

  • 1. TELKOMNIKA, Vol.17, No.6, December 2019, pp.2697~2703 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v17i6.12218 ◼ 2697 Received January 8, 2019; Revised February 19, 2019; Accepted March 12, 2019 Wireless power transfer enabled NOMA relay systems: two SIC modes and performance evaluation Dinh-Thuan Do*1 , Chi-Bao Le2 , Hong-Nhu Nguyen3 , Tam Nguyen Kieu4 , Si-Phu Le5 , Ngoc-Long Nguyen6 , Nhat-Tien Nguyen7 , Miroslav Voznak8 1 Wireless Communications Research Group, Ton Duc Thang University, Ho Chi Minh City, Vietnam 1 Faculty of Electrical & Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City, Vietnam 2 Faculty of Electronics Technology, Industrial University of Ho Chi Minh City, Vietnam 3,4,5,6,7,8 Faculty of Electrical Engineering and Computer Science, VSB-Technical University of Ostrava, Czech Republic *Corresponding author, e-mail: dodinhthuan@tdtu.edu.vn Abstract In this study, we deploy design and performance analysis in new system model using a relaying model, energy harvesting, and non-orthogonal multi-access (NOMA) network. It is called such topology as wireless powered NOMA relaying (WPNR). In the proposed model, NOMA will be investigated in two cases including single successive interference cancellation (SIC) and dual SIC. Moreover, the simultaneous wireless information and power transfer (SWIPT) technology can be employed to feed energy to relays who intend to serve far NOMA users. In particular, exact outage probability expressions are provided to performance evaluation. The results from the simulations are used to demonstrate the outage performance of the proposed model in comparison with the current models and to verify correct of derived expressions. Keywords: energy harvesting, non-orthogonal multiple access, outage probability Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction The fifth generation (5G) of mobile communication networks is considered as a progressive form of the fourth generation (4G) networks with many tremendous functions like internet-of-thing (IoT) and cloud-based applications in [1, 2]. These modern services lead to challenging requirements such as faster data rates, lower suspension, wider connectivity and better spectral and energy impact. Consequently, in order to meet these demands, a range of modern techniques used as a new technological tool to access NOMA may be a very potential selection for the 5G network since it complies with all the specifications for spectral impact, massive connectivity, user fairness and low suspension as mentioned in [3]. On the other hand, when NOMA utilizes the energy domain, many different users will be accessed at the same time, in terms of frequency, time and code according to their own channel conditions. Whereas high power transmission rates will be selected for users with poor channel conditions, users with better channel conditions can use lower power levels. As a result, NOMA requires multiple communication notes at the base station superposition for receivers using superposition coding (SC) technique. With SIC technology, NOMA users eliminate all weaker ones’ communication notes and consider the stronger users’ notes as an intervention to decipher the own note in [4]. The active strong users (SU) can employ the weaker users' (WU) notes to transfer WU’s notes and increase the network security which are considered as the collaborative NOMA models in [5, 6]. In recent times, SWIPT has been suggested as a potential technique that can extend the working time of some devices such as energy-limited devices, energy-limited sensors, IoT devices, etc. SWIPT can endure terminals with traditional wires and considerably expand its spare time. For that reason, SWIPT is considered a favorable technique for energy limited networks. In most recent studies, SWIPT in information systems has implemented in centralized antenna systems (CAS). There has been concentration on extracting the maximum beam-forming energy splitting SWIPT to take advantage of focusing on a remote field electromagnetic radiation as regards in [7–10]. By combining relaying network with NOMA, cooperative NOMA has well studied
  • 2. ◼ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 6, December 2019: 2697-2703 2698 in [11–15]. In [13], the authors combine SWIPT with NOMA network for existing SUs to transmit WUs notes because there is no necessity to use energy for this cooperation. In the meantime, in order to increase the individual data rate, the wireless powered communication networks (WPCN) technology was combined with NOMA uplink network [14]. On the other hand, in [15], NOMA is examined in term of energy effects in WPC systems. Additionally, in [16], the downlink of NOMA is researched together with SWIPT (rather than WPC). Nevertheless, SWIPT is only adjusted by close users and remote users are overwhelmed. It is shown that on-off power splitting (OPS) as a special case of dynamic power splitting (DPS) which can obtain the maximum rate area in such design. Therefore, the outage probability and the diversity degree are extracted for the downlink cooperative NOMA where SWIPT is only deployed at adjacent users and the static power splitting (SPS) as a specific situation of OPS. In [17], NOMA security is explored attentively. In particular, an artificial noise-aided beam-forming design issue is investigated to provide the high security level of a multiple-input single-output NOMA SWIPT network. EH mode facilitates NOMA network with extended time of operation as limited power as recent work [18, 19]. Furthermore, NOMA scheme can be applied in device-to-device transmission, cognitive radio or physical layer security-aware network [20–24]. The rest of this paper is arranged as follows. The model system is demonstrated in section 1. Section 3 introduces the entire downlink transmission of outage probability. The simulation results are presented in section 4. After all, conclusion is taken in section 5. 2. System Model We examine a wireless communication system as in Figure 1, with a base station indicated by BS (assigned capability of wireless power transfer), two relays indicated by R1 and R2 which can be approached by using NOMA and two remote users indicated by U1 and U2. It is noted that R1 and R2 are located in the coverage area of wireless power transfer. It is supposed that non-existence of direct link from BS with U1 and U2 and thus we need two relays to transfer to the U1 and U2 users. These relays are self-powered devices thanks to EH (energy harvesting). It can be found that symbol appears in the baseband whereas EH appears in RF band. The separated Rayleigh channel factor between S and R1 and R2 is hR1 and hU2 . At the same time, between R1 and U1 and R2 and U2 are hU1 and hU2 , respectively. Two SIC modes are deployed here. Dual SIC is required at link BS-R1-U1 while single SIC assigned at link BS-R2- U2. Base Station (BS) Relay 1 (R2) Relay 1 (R1) User 2 (U2) User 1 (U1) hR1 hU1 hR2 hU2 Energy Harvesting Information Processing Figure 1. System model for EH NOMA network 2.1. Downlink NOMA Relays (WPNR) First, the BS transmits a superimposed NOMA signal (∑ 𝑥𝑖 𝑎𝑖𝑖∈1,2 ) to 𝑅1 and 𝑅2 with power distribution fractions 𝑎1 and 𝑎2, respectively, where 𝑎1 < 𝑎2 and 𝑎1 2 + 𝑎2 2 = 1. The received signal at relay 𝑅1 and 𝑅2, respectively is given as: 𝑦𝑅1 𝑇1 = √𝑎1 𝑃𝑥1ℎ 𝑅1 + √𝑎2 𝑃𝑥2ℎ 𝑅1 + 𝑛 𝑅1 (1)
  • 3. TELKOMNIKA ISSN: 1693-6930 ◼ Wireless power transfer enabled NOMA relay systems: two SIC modes… (Dinh-Thuan Do) 2699 and 𝑦𝑅2 𝑇1 = √𝑎1 𝑃𝑥1ℎ 𝑅2 + √𝑎2 𝑃𝑥2ℎ 𝑅2 + 𝑛 𝑅2 (2) In this case, 𝑥1 and 𝑥2 are signal intended for 𝑈1 and 𝑈2, respectively, 𝑛 𝑅1 ~𝐶𝑁(0, 𝜎 𝑅1 2 ) and 𝑛 𝑅2 ~𝐶𝑁(0, 𝜎 𝑅2 2 ) define the additive white Gaussian noise (AWGN) at 𝑅1 and 𝑅2 with equivalent variance 𝜎 𝑅1 2 = 𝜎 𝑅2 2 = 𝜎2 . We first compute Signal to Interference and Noise Ratio (SINR) at 𝑅1 to detect signal 𝑥2 as 𝛾𝑥2 𝑅1 = 𝜌|ℎ 𝑅1 | 2 𝑎2 𝜌|ℎ 𝑅1 | 2 𝑎1 + 1 (3) where 𝜌 = 𝑃 𝜎2 is the transmit Signal to Noise ratio (SNR) at 𝑅1. Then, SNR is computed at 𝑅1 to detect signal 𝑥1 as 𝛾𝑥1 𝑅1 = 𝜌|ℎ 𝑅1 | 2 𝑎1 (4) not the same 𝑅1, 𝑅2 deciphers 𝑥2 only when it is receives higher energy: 𝛾𝑥2 𝑅2 = 𝜌|ℎ 𝑅2 | 2 𝑎2 𝜌|ℎ 𝑅2 | 2 𝑎1 + 1 (5) 2.2. Energy Harvesting In order to deploy the relay structure simply, the two relays in WPNR harvest energy from the signals (xe) transmitted by the BS in the second phase with 𝐸({𝑥 𝑒}2)=1. When 𝑅1 is closer S than 𝑅2, it harvests more energy than 𝑅2. This unbalance is verified by 𝑅1 consumes more energy to analyze data and transmits it to 𝑈1. All of the powers harvested in this phase are 𝑃𝑅1 𝑇2 = 𝜂𝑃𝛼|ℎ 𝑅1 | 2 3 (6) and 𝑃𝑅2 𝑇2 = 𝜂𝑃𝛼|ℎ 𝑅2 | 2 3 (7) 2.3. Downlink NOMA using Relay During this time, the WPNR utilizes the harvested energy to transmit the symbols to the certain users, that is, 𝑅1 transmits both 𝑥1 and 𝑥2 to 𝑈1, while 𝑅2 transmits 𝑥2 to 𝑈2, the received signal can be obtained at and respectively as 𝑦 𝑈1 = √𝑃𝑅1 𝑇2 (√𝑏1 𝑥1 + √𝑏2 𝑥2)ℎ 𝑈1 + 𝑛 𝑈1 (8) where power allocation factors 𝑏1 > 𝑏2 and 𝑏1 2 + 𝑏2 2 = 1 𝑦 𝑈2 = √𝑃𝑅2 𝑇2 𝑥2ℎ 𝑈2 + 𝑛 𝑈2 (9) It is worth noting that 𝑃𝑅1 and 𝑃𝑅2 are the power harvested, we obtained as (6) and (7). The SINR at 𝑈1 to detect 𝑥1 and 𝑥2 and 𝑈2 detects 𝑥2 respectively illustrated as 𝛾𝑥1 𝑈1 = 𝑃𝑅1 𝑇2 𝑏1|ℎ 𝑈1 | 2 𝑃𝑅1 𝑇2 𝑏2|ℎ 𝑈1 | 2 + 𝜎2 (10)
  • 4. ◼ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 6, December 2019: 2697-2703 2700 and 𝛾𝑥2 𝑈1 = 𝑃𝑅1 𝑇2 |ℎ 𝑈1 | 2 𝜎2 (11) and 𝛾𝑥2 𝑈2 = 𝑃𝑅2 𝑇2 |ℎ 𝑈2 | 2 𝜎2 (12) 3. Outage Probability for the Entire Downlink Transmission The outage probability in downlink transfer will occur if the transmitted data is not performed well by the relay or by the end NOMA user. The outage probability (𝑂𝑥1 𝑈1 ) of 𝑥1 at 𝑈1 is indicated as: 𝑂𝑥1 𝑈1 = 1 − (𝑂 𝑅1 𝑂 𝑈1 ) (13) in which 𝑂 𝑅1 = (1 − Pr(𝛾𝑥2 𝑅1 < 𝛾2)) (1 − Pr(𝛾𝑥1 𝑅1 < 𝛾1)), 𝑂 𝑈1 = (1 − Pr(𝛾𝑥1 𝑈1 < 𝛾1)) (1 − Pr(𝛾𝑥2 𝑈1 < 𝛾1)), 𝛾1 = 2 𝑅1 − 1 and 𝛾2 = 2 𝑅2 − 1, whereas 𝑅1 and 𝑅2 stand for the threshold rates of 𝑥1 and 𝑥2 respectively. From (3) and (4), 𝑂 𝑅1 can be given as 𝑂 𝑅1 = (1 − Pr ( 𝜌|ℎ 𝑅1 | 2 𝑎2 𝜌|ℎ 𝑅1 | 2 𝑎1 + 1 < 𝛾2)) (1 − Pr (𝜌|ℎ 𝑅1 | 2 𝑎1 < 𝛾1)) = Pr (|ℎ 𝑅1 | 2 > max ( 𝛾2 𝜌(𝑎2 − 𝛾2 𝑎1) , 𝛾1 𝜌𝑎1 ) 𝜒1) = 𝑒 − 𝜒1 𝜆 𝑅1 (14) By substituting the value of 𝑃𝑅1 𝑇2 from (6) into above expression and after some numerical computations, we can figure out: 𝑂 𝑈1 = (1 − Pr ( 𝑃𝑅1 𝑇2 |ℎ 𝑈1 | 2 (𝑏1 − 𝑏2 𝛾1) 𝜎 𝑈 2 < 𝛾1)) ⏟ 𝐼1 × (1 − Pr ( 𝑃𝑅1 𝑇2 |ℎ 𝑈1 | 2 𝑏2 𝜎 𝑈 2 < 𝛾2)) ⏟ 𝐼2 (15) we consider each component and 𝐼1 are expressed as 𝐼1 = 1 − Pr ( 𝑃𝑅1 𝑇2 |ℎ 𝑈1 | 2 (𝑏1 − 𝑏2 𝛾1) 𝜎 𝑈 2 < 𝛾1) = 1 − ∫ (1 − 𝑒− 𝜃1 𝑥 ) 𝑒−𝑥 𝑑𝑥 ∞ 0 (16) with the assistance of [[25], Eq (3.324.1)], the above equation can be rewritten as 𝐼1 = 2√ 𝜃1 𝜆 𝑅1 𝜆 𝑈1 𝐾1 (2√ 𝜃1 𝜆 𝑅1 𝜆 𝑈1 ) (17) Similar computation can be deployed for 𝐼2 𝐼2 = 1 − Pr ( 𝑃𝑅1 𝑇2 |ℎ 𝑈1 | 2 𝑏2 𝜎 𝑈 2 < 𝛾2) = 1 − ∫ (1 − 𝑒− 𝜃2 𝑥 ) 𝑒−𝑥 𝑑𝑥 ∞ 0 (18)
  • 5. TELKOMNIKA ISSN: 1693-6930 ◼ Wireless power transfer enabled NOMA relay systems: two SIC modes… (Dinh-Thuan Do) 2701 and 𝐼2 = 2√ 𝜃2 𝜆 𝑅2 𝜆 𝑈1 𝐾1 (2√ 𝜃2 𝜆 𝑅2 𝜆 𝑈1 ) (19) where 𝐾1(. ) is the first order Bessel function of the second kind. After replacing (14) and (15) into (13), it can be obtained 𝑂𝑥1 𝑈1 as 𝑂 𝑈1 = 4√ 𝜃1 𝜃2 𝜆 𝑅1 𝜆 𝑅2 𝜆 𝑈1 2 𝐾1 (2√ 𝜃1 𝜆 𝑅1 𝜆 𝑈1 ) 𝐾1 (2√ 𝜃1 𝜆 𝑅1 𝜆 𝑈1 ) (2-) Now the outage probability at 𝑈2 can be calculated for 𝑥2 which can be taken as: 𝑂𝑥2 𝑈2 = 1 − 𝑂 𝑅2 𝑂 𝑈2 (21) where 𝑂 𝑅2 = (1 − Pr(𝛾𝑥2 𝑅2 < 𝛾2)) and 𝑂 𝑈2 = (1 − Pr(𝛾𝑥2 𝑈2 < 𝛾2)). Based on (5), 𝑂 𝑅2 is given by 𝑂 𝑅2 = (1 − ( 𝜌|ℎ 𝑅2 | 2 𝑎2 𝜌|ℎ 𝑅2 | 2 𝑎1 + 1 < 𝛾2)) = 𝑒 − 𝛾2 𝜌 𝜆 𝑅2(𝑎2−𝛾2 𝑎1) (22) similarly, with the support of [[20], Eq. (3.324.1)], we can express following equation 𝑂 𝑈2 = (1 − Pr ( 𝑃𝑅2 𝑇2 |ℎ 𝑈2 | 2 𝜎 𝑈 2 < 𝛾2)) = 2√ 𝜃3 𝜆 𝑅2 𝜆 𝑈2 𝐾1 (2√ 𝜃3 𝜆 𝑅2 𝜆 𝑈2 ) (23) by substituting (22) and (23) into (21), the respective expression of 𝑂𝑥2 𝑈2 is acquired. 4. Simulation Results In this section, the system outage probability for such EH-NOMA is evaluated under different target rates, transmit SNR, percentage of harvested power. We set power allocation factors as illustrations in each figure. Figure 2 plot the outage performance is merely referred to 𝑅𝑖. However, in order to ensure a communication reliability, we should select a small value for the target rate and the SNR is guaranteed enough high. It can be seen that higher target rates limit outage performance. It is obvious that the NOMA networks have different power allocation factors, and hence performance gap between two far NOMA users exist. Figure 3 indicates that the outage probability for such EH NOMA with different power splitting fractions for energy harvesting policy, where energy harvesting contributes to increasing power assigned at relay. We can conclude from Figure 3 that in comparison with three circumstances of EH-NOMA with varying power splitting fractions, the proposed model with higher time power collecting allocation can distinguish the outage probability. Furthermore, Figure 3 indicates that EH-NOMA can raise remarkably the outage probability at high transmit SNR at the BS. Besides, the analytic lines adapt the Monte-Carlo simulation very well. Figure 4 shows outage performance of EH NOMA versus transmit SNR. It is obvious that 𝛼 has a significant effect on the outage probability of the proposed network. It is shown that in Figure 5 the network throughput in delay-limited mode can be compared as varying target rates. The throughput of the second NOMA user is better than that of the first user, since they are allocated different power factors. In addition, the figures illustrate that EH-NOMA hits the flux ceiling in the high SNR scheme. Moreover, it is important noting that the throughput is resulted from achieved outage probably and these trends of lines can be expected.
  • 6. ◼ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 6, December 2019: 2697-2703 2702 Figure 2. Outage probability versus the transmit 𝜌, with 𝛼 = 0.2, 𝜂 = 0.9, 𝑎1 = 𝑏2 = 0.2 and 𝑎2 = 𝑏1 = 0.8 Figure 3. Outage probability versus the transmit 𝜌, with 𝜂 = 0.9, 𝑎1 = 𝑏2 = 0.2 and 𝑎2 = 𝑏1 = 0.8 Figure 4. Outage probability versus the power splitting fraction 𝛼, with 𝜂 = 0.9, 𝑅1 = 𝑅2 = 1 (bps/Hz), 𝑎1 = 𝑏2 = 0.2 and 𝑎1 = 𝑏2 = 0.2 Figure 5. Throughput performance of EH NOMA with 𝛼 = 0.2, 𝜂 = 0.9, 𝑎1 = 𝑏2 = 0.2 and 𝑎1 = 𝑏2 = 0.2 5. Conclusion In conclusion, a modern EH NOMA model for downlinks has been introduced in this paper. The main results attempt to distinguish two NOMA users in the same design group from users from other groups using the NOMA concept. We propose two situations related SIC deployment. Therefore, performance gap among two NOMA users still remains fairness if careful selection of power allocation factors. Simulation results demonstrate that all of the energy utilized in the model is not as much of the NOMA transmission but reasonable performance can be achieved. Acknowledgement This research is funded by Foundation for Science and Technology Development of Ton Duc Thang University (FOSTECT), website: http://fostect.tdt.edu.vn, under Grant FOSTECT.2017.BR.21.
  • 7. TELKOMNIKA ISSN: 1693-6930 ◼ Wireless power transfer enabled NOMA relay systems: two SIC modes… (Dinh-Thuan Do) 2703 References [1] Wunder G, et al. 5GNOW: Non-orthogonal, asynchronous waveforms for future mobile applications. IEEE Commun. Mag. 2014; 52(2): 97-105. [2] Andrews JG, et al. What will 5G be?. IEEE J. Sel. Areas Commun. 2014; 32(6): 1065-1082. [3] Benjebbour A, Li A, Saito Y, Kishiyama Y, Harada A, Nakamura T. System-level performance of downlink NOMA for future LTE enhancements. Proc. IEEE Globecom Workshops (GC Wkshps). 2013: 66-70. [4] Saito Y, Benjebbour A, Kishiyama Y, Nakamura T. Systemlevel performance evaluation of downlink non-orthogonal multiple access (NOMA). Proc. IEEE 24th Int. Symp. Pers. Indoor Mobile Radio Commun. (PIMRC). 2013: 611–615. [5] Ding Z, Peng M, Poor HV. Cooperative non-orthogonal multiple access in 5G systems. IEEE Commun. Lett. 2015; 19(8): 1462-1465. [6] Do NT, da Costa DB, Duong TQ, An B. A BNBF user selection scheme for NOMA-based cooperative relaying systems with SWIPT. IEEE Commun. Lett. 2017; 21(3): 664–667. [7] Do DT. Power Switching Protocol for Two-way Relaying Network under Hardware Impairments. Radioengineering. 2015; 24(3): 765-771. [8] Do DT, Nguyen HS, Voznak M, Nguyen TS. Wireless powered relaying networks under imperfect channel state information: system performance and optimal policy for instantaneous rate. Radioengineering, 2017; 26(3):869-877. [9] Do DT. Energy-Aware Two-Way Relaying Networks under Imperfect Hardware: Optimal Throughput Design and Analysis. Telecommunication Systems (Springer). 2015; 62(2): 449-459. [10] Nguyen XX, Do DT. Optimal power allocation and throughput performance of full-duplex DF relaying networks with wireless power transfer- ware channel. EURASIP Journal on Wireless Communications and Networking. 2017; 2017(1): 152. [11] Do DT, Le CB. Exploiting Outage Performance of Wireless Powered NOMA. TELKOMNIKA Telecommunication Computing Electronics and Control. 2018; 16(5): 1907-1917. [12] Do DT, Nguyen TTT. Exact Outage Performance Analysis of Amplify-and-Forward-Aware Cooperative NOMA. TELKOMNIKA Telecommunication Computing Electronics and Control. 2018; 16(5): 1966-1973. [13] Do DT, Nguyen MSV, Hoang TA. Comparison study on secrecy probability of AF-NOMA and AF-OMA networks. TELKOMNIKA Telecommunication Computing Electronics and Control. 2019; 17(5): 2200-2207. [14] Do DT, Vaezi M, Nguyen TL. Wireless Powered Cooperative Relaying using NOMA with Imperfect CSI. Proc. of IEEE Globecom Workshops (GC Wkshps). Abu Dhabi. 2018: 1-6. [15] Zewde TA, Gursoy MC. NOMA-based energy-efficient wireless powered communications. IEEE Trans. Green Commun. and Net. 2018; 2(3): 679-692. [16] Gong J, Chen X. Achievable rate region of non-orthogonal multiple access systems with wireless powered decoder. IEEE J. Sel. Areas Commun. 2017; 35(12): 2846-2859. [17] Li Y, et al. Secure beamforming in downlink MISO non-orthogonal multiple access systems. IEEE Trans. Veh. Technol. 2017; 66(8): 7563-7567. [18] Nguyen TL, Do DT. Exploiting Impacts of Intercell Interference on SWIPT-assisted Non-orthogonal Multiple Access. Wireless Communications and Mobile Computing. 2018; 2018. [19] Do DT, Le CB. Application of NOMA in Wireless System with Wireless Power Transfer Scheme: Outage and Ergodic Capacity Performance Analysis. Sensors. 2018; 18(10): 3501. [20] Do DT, Van Nguyen MS, Hoang TA, Voznak M. NOMA-Assisted Multiple Access Scheme for IoT Deployment: Relay Selection Model and Secrecy Performance Improvement. Sensors. 2019; 19(3): 736. [21] DT Do, AT Le, CB Le, BM Lee. On Exact Outage and Throughput Performance of Cognitive Radio based Non-Orthogonal Multiple Access Networks with and Without D2D Link. Sensors. 2019; 19(15): 3314. [22] Do DT, Thi Nguyen TT. Impacts of imperfect SIC and imperfect hardware in performance analysis on AF non-orthogonal multiple access network. Telecommunication Systems. 2019: 1-15. [23] Do DT, Van Nguyen MS. Device-to-device transmission modes in NOMA network with and without Wireless Power Transfer. Computer Communications. 2019; 139: 67-77. [24] Do DT, A.-T. Le, B. M. Lee. On Performance Analysis of Underlay Cognitive Radio-Aware Hybrid OMA/NOMA Networks with Imperfect CSI. Electronics. 2019; 8: 819. [25] Gradshteyn IS, Ryzhik IM. Table of integrals, series, and products. Seventh edition. Academic press. 2007.