SlideShare a Scribd company logo
1 of 8
Download to read offline
Bulletin of Electrical Engineering and Informatics
Vol. 10, No. 1, February 2021, pp. 241∼248
ISSN: 2302-9285, DOI: 10.11591/eei.v10i1.2102 r 241
Employing non-orthogonal multiple access scheme in
UAV-based wireless networks
Chi-Bao Le1
, Dinh-Thuan Do 2
1
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Vietnam
2
Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang
University, Vietnam
Article Info
Article history:
Received Oct 27, 2019
Revised Apr 3, 2020
Accepted Jun 25, 2020
Keywords:
NOMA
Outage Probability
UAV
ABSTRACT
This paper studies the two-hop transmission relying unmanned aerial vehicle (UAV)
relays which is suitable to implement in the internet of things (IoT) systems. To en-
hance system performance in order to overcome the large scale fading between the base
station (BS) and destination as well as achieve the higher spectrum efficiency, where
non-orthogonal multiple access (NOMA) strategies were typically applied for UAV
relays to implement massive connections transmission. In particular, outage proba-
bility is evaluated via signal to noise ratio (SNR) criterion so that the terminal node
can obtain reasonable performance. The derivations and analysis results showed that
the considered fixed power allocation scheme provides performance gap among two
signals at destination.The numerical simulation confirmed the exactness of derived
expressions in the UAV assisted system.
This is an open access article under the CC BY-SA license.
Corresponding Author:
Dinh-Thuan Do,
Wireless Communications Research Group,
Faculty of Electrical and Electronics Engineering,
Ton Duc Thang University, Ho Chi Minh City, Vietnam.
Email: dodinhthuan@tdtu.edu.vn
1. INTRODUCTION
Wireless communication technology has pace to adapt demand with rapid development of new tech-
niques. The decreasing cost of unmanned aerial vehicle (UAV) network together with the dramatical innovation
of UAV-based manufacturing technology provides connections as some difficulties happen. Therefore, some
applications such as weather monitoring systems, forest fire prevention technology, man-v-machine are pro-
vided by many new UAV applications appeared in the civilian market. In order to implement the UAV relay
based IoT networks, wide range of applications of UAV-based network attracts more attentions from community
of researchers [1]. Recently, to achieve throughput transmission above 10Gbps, ultra density device connection
and millisecond transmission delay, implement of 5G/B5G networks needs UAV assisted communications as
reported in [2, 3]. The network coverage expands to 3D interconnection as crucial demand for development
of the future communications and it releases the large scale fading regarding very high speed transmission.
Moreover, higher cost and difficulty in the construction of cellular stations happen and such situation leads
to solutions of the IoT network by employing the UAV relays assisted Communication. UAV-based network
benefits to infrastructure development by providing itss convenient implement and lower cost, high-altitude
assisted transmission [4, 5]. The main advantages of the UAV relay assisted communications are reducing the
obstruction from buildings, mountains and archieving the higher line of sight (LoS) transmission effect [6, 7].
Journal homepage: http://beei.org
242 r ISSN: 2302-9285
Due to ability of massive connections and higher spectrum efficiency, NOMA has attracted great
research interest from both academia and industry [8–24]. Since users aware on imperfect channel state infor-
mation (CSI), the author studied the impact of imperfect CSI on the performance of NOMA in [15]. In [16],
the throughput aspects of the cognitive radio as applying NOMA techniques were discussed and compared.
2. SYSTEM MODEL
Figure 1 shows system model containing the two-hop transmission using UAV relay communication
model. Two UAV relays operate in half duplex and DF mode to signal forwarding, while separated signal is
detected at destination. The terminal IoT node receives signal from two links as shown in Figure 1. Typically,
the obstacles or blockage of urban buildings and mountains limit quality of the communication between the
base station BS and terminal node D, then the UAV relays are implemented to realize assisted communication.
The destination user needs two phases to perform its the transmission process. In the first phase, the BS
transmits mixture signal to the two UAV relay nodes R1, R2. The channels hi between the BS and the UAV
relays follow Nakagami-m distribution.
D
R1
R2
1
1
2
2
S
S
P
x
P
x



1
1
2
2
S
S
P x
P x



1
1
ˆ
R
P x

2
2
ˆ
R
P
x

BS
Figure 1. System model of UAV-assisted NOMA.
The received signal at UAV relays are given as
yi = hi
√
ϕ1PSx1 +
√
ϕ2PSx2

, i ∈ {1, 2}. (1)
The signal to noise ratio (SNR) is used to dectect x2 as
ΓR1,x2
=
ϕ2ρ |h1|
ϕ1ρ |h1| + 1
, (2)
where ρ = PS
N0
= PR
N0
is the transmit signal to noise radio (SNR).
After SIC happens, SNR is given to detect signal x1 as
ΓR1,x1 = ϕ1ρ |h1| . (3)
Similarly, SNR at R2 to detect x2 is given as
ΓR2,x2 =
ϕ2ρ |h2|
ϕ1ρ |h2| + 1
. (4)
Next, we will introduce the channel model of Ri → D link. In general, the UAV coverage is a circular
cell and the UAV is located at the vertical center. Thus, the channel vector of Ri → D link can be expressed as
Bulletin of Electr Eng  Inf, Vol. 10, No. 1, February 2021 : 241 – 248
Bulletin of Electr Eng  Inf ISSN: 2302-9285 r 243
gi = Liḡi , i ∈ {1, 2}, (5)
where the free space loss of the path Li is given by
Li =
λu
4π
q
d2
Ri
+ d2
h
, (6)
where dh and dRi
denote the height of UAV relay and the distance from the center of two UAV relay’s
to D, respectively, λu represents the wavelength.
Then, in the second phase of communication, each UAV relay forwards detected symbols to the des-
tination (uplink-NOMA) and the received signal at user is given as
yD =
p
PR (
√
ϕ1x̂1L1ḡ1 +
√
ϕ2x̂2L2ḡ2) . (7)
where PR is the normalized transmission powers at two relay’s
It can be computed SNR at user D to detect signal x2 is
ΓD,x2
=
ρϕ2L−2
2 |g2|
2
ρϕ1L−2
1 |g1|
2
+ 1
. (8)
Then, SNR at user D is calculated to detect signal x1 is
ΓD,x1
= ρϕ1L−2
1 |g1|
2
. (9)
3. PERFORMANCE ANALYSIS
3.1. Outage probability of x1
At destination, user D needs detect its signals. However, these signals are evaluated via outage proba-
bility. Such outage is defined as probability to SNR less than the pre-defined threshold SNR. We first consider
outage performance of x1 as below:
Px1 = Pr (ΓR1,x2  ε2 ∪ ΓR1,x1  ε1 ∪ ΓD,x2  ε2 ∪ ΓD,x1  ε1)
=1 − Pr (ΓR1,x2 ≥ ε2 ∪ ΓR1,x1 ≥ ε1 ∪ ΓD,x2 ≥ ε2 ∪ ΓD,x1 ≥ ε1)
=1 − Pr (|h1| ≥ χ)
| {z }
A1
Pr

|g2|
2
≥ δ|g1|
2
+ $2, |g1|
2
≥ $1

| {z }
A2
,
(10)
where ε1 = 22R1
− 1 with R1 being the target rate at D to detect x1, ε2 = 22R2
− 1 with R2 being
the target rate at D to detect x2, χ = max

ε2
ρ(ϕ2−ε2ϕ1) , ε1
ϕ1ρ

, δ =
ε2ϕ1L−2
1
ϕ2L−2
2
, $1 = ε1
ρϕ1L−2
1
and $2 = ε2
ρϕ2L−2
2
Let Zi =
n
|hi|
2
, |gi|
2
o
, i ∈ {1, 2} and we set, The CDFs and PDFs of Z
FZi (x) = 1 − e−µzi
x
mzi
−1
X
s=0
µs
zi
xs
s!
, (11)
and
fZi (x) =
µ
mZi
Zi
xmZi
−1
e−µZi
x
Γ (mZi )
, (12)
Employing non-orthogonal multiple access scheme in UAV-based wireless networks (Chi-Bao Le)
244 r ISSN: 2302-9285
where µzi =
mzi
λzi
A1 = Pr (|h1| ≥ χ)
=1 − F|h1| (χ)
=e−µh1
χ
mh1
−1
X
a=0
µa
h1
χa
a!
.
(13)
Then, A2 is given by
A2 = Pr

|g2|
2
≥ δ|g1|
2
+ $2, |g1|
2
≥ $1

=
∞
Z
$1
f|g1|2 (x)
h
1 − F|g2|2 (δx + $2)
i
dx
=
mg2 −1
X
d=0
µd
g2
µ
mg1
g1 e−µg2
$2
d!Γ (mg1 )
∞
Z
$1
xmg1
−1
e−x(µg1 +µg2 δ)(δx + $2)
d
dx
=
mg2 −1
X
d=0
d
X
t=0

d
t

µd
g2
µ
mg1
g1 $d−t
2 δt
e−µg2
$2
d!Γ (mg1 )
∞
Z
$1
xmg1
+t−1
e−x(µg1 +µg2 δ)dx.
(14)
Applying [[23], (3.351.2)], A2 is given by
A2 =
mg2
−1
X
d=0
d
X
t=0
mg1
+t−1
X
k=0

d
t

µd
g2
µ
mg1
g1 $d−t
2 δt
Γ (mg1
+ t) $k
1 e−µg2
$2−$1(µg1
+µg2
δ)
d!k!Γ (mg1
) (µg1
+ µg2
δ)
mg1
+t−k
(15)
where Γ (x) = (x − 1)! is the gamma function. Next, substituting (15) and (13) into (10), Px1 is
expressed by
Px1
=1 − e−µh1
χ
mh1
−1
X
a=0
mg2
−1
X
d=0
d
X
t=0
mg1
+t−1
X
k=0

d
t

µd
g2
µ
mg1
g1 µa
h1
χa
$d−t
2 δt
Γ (mg1 + t) $k
1
a!d!k!Γ (mg1 )
×
e−µg2
$2−$1(µg1
+µg2
δ)
(µg1
+ µg2
δ)
mg1
+t−k
.
(16)
When ρ → ∞, by using e−x
≈ 1 − x so the asymptotic of P∞
x1
is formulated by
P∞
x1
=1 − (1 − µh1
χ)
mh1
−1
X
a=0
mg2
−1
X
d=0
d
X
t=0
mg1
+t−1
X
k=0

d
t

µd
g2
µ
mg1
g1 µa
h1
χa
$d−t
2 δt
Γ (mg1
+ t) $k
1
a!d!k!Γ (mg1
)
×
[1 − µg2 $2 − $1 (µg1 + µg2 δ)]
(µg1
+ µg2
δ)
mg1
+t−k
.
(17)
According to (8), we have lim
ρ→∞
ΓD,x2
=
ϕ2L−2
2 |g2|2
ϕ1L−2
1 |g1|2 the approximate of Papp.
x1
and Papp.
x2
are given by
Papp.
x1
= Papp.
x2
=
mg2
−1
X
d=0
µd
g2
µ
mg1
g1 δd
Γ (mg1 + d)
d!Γ (mg1
) (µg1
+ µg2
δ)
mg1
+d
. (18)
Bulletin of Electr Eng  Inf, Vol. 10, No. 1, February 2021 : 241 – 248
Bulletin of Electr Eng  Inf ISSN: 2302-9285 r 245
3.2. Outage probability of x2
Similarly, outage performance of x2 can be formulated by
Px2
= Pr (ΓR2,x2
 ε2 ∪ ΓD,x2
 ε2)
=1 − Pr (ΓR2,x2
≥ ε2, ΓD,x2
≥ ε2)
=1 − Pr (|h2| ≥ ν)
| {z }
B1
Pr

|g2|
2
≥ δ|g1|
2
+ $2

| {z }
B2
,
(19)
where ν = ε2
ρ(ϕ2−ε2ϕ1)
We need compute each outage component as
B1 = Pr (|h2| ≥ ν)
=1 − F|h2| (ν)
=e−µh2
ν
mh2
−1
X
b=0
µb
h2
νb
b!
.
(20)
Then, we continue to compute the second term as
B2 = Pr

|g2|
2
≥ δ|g1|
2
+ $2

=
∞
Z
0
f|g1|2 (x)
h
1 − F|g2|2 (δx + $2)
i
dx
=
mg2
−1
X
d=0
d
X
t=0

d
t

µd
g2
µ
mg1
g1 δt
$d−t
2 e−µg2 $2
d!Γ (mg1
)
∞
Z
0
xmg1
+t−1
e−x(µg1
+µg2
δ)dx.
(21)
Based on [[17], (3.351.3)], B2 is given by
B2 =
mg2 −1
X
d=0
d
X
t=0

d
t

µd
g2
µ
mg1
g1 δt
$d−t
2 Γ (mg1 + t) e−µg2
$2
d!Γ (mg1
) (µg1
+ µg2
δ)
mg1
+t . (22)
Substituting (22) and (20) into (19), Px2
is given by
Px2
= 1 − e−µh2
ν
mh2
−1
X
b=0
mg2
−1
X
d=0
d
X
t=0

d
t

µb
h2
νb
µd
g2
µ
mg1
g1 δt
$d−t
2 Γ (mg1 + t) e−µg2
$2
b!d!Γ (mg1
) (µg1
+ µg2
δ)
mg1
+t . (23)
Corresponding to formula (17) the asymptotic of P∞
x2
is given by
P∞
x2
= 1 − (1 − µh2 ν)
mh2
−1
X
b=0
mg2
−1
X
d=0
d
X
t=0

d
t

µb
h2
νb
µd
g2
µ
mg1
g1 δt
$d−t
2 Γ (mg1
+ t) (1 − µg2
$2)
b!d!Γ (mg1 ) (µg1 + µg2 δ)
mg1 +t . (24)
4. NUMERICAL RESULTS
We set fading parameter m = mh1
= mh2
= mg1
= mg2
= 2 and channel gains as λ = λh1
=
λh2 = λg1 = λg2 = 1. The power allocation coefficients of NOMA’s users are ϕ1 = 0.1 and ϕ1 = 0.9.
The target rates are R1 and R2 and they are set to be R1 = R2 = 0.5. The times of Monte Carlo simulation
107
. The height of UAV dh = 300 m. The distance between R1 → D and R2 → D are dR1D = 200 m and
dR1D = 100 m, respectively.
Employing non-orthogonal multiple access scheme in UAV-based wireless networks (Chi-Bao Le)
246 r ISSN: 2302-9285
Figure 2 shows outage performance versus transmit SNR. We consider four cases of m. As can be
seen from such outage performance, asymptotic curves are very matched with exact curves. Signal x2 exhibits
better outage probability compared with x1 since different power allocated to each signal. The simulation
results are also very tight with the analytical results. m = 4 is considered as the best case among these curves.
Figure 3 confirms that NOMA benefits to outage performance of signal x2 as it is better than OMA
method. Figure 4 indicates the optimal outage for signal x1 and it happens at ϕ1 = 0.25. Higher threshold
SNR results in worse outage performance of two signals as observation from Figure 5.
0 5 10 15 20 25 30 35
10-3
10-2
10
-1
10
0
Outage
Probability
m = 1
m = 2
m = 3
m = 4
Figure 2. Outage performance of x1 and x2
versus transmit SNR
0 5 10 15 20 25 30 35
10-3
10-2
10
-1
10
0
Outage
Probability
m = 4
m = 1
Figure 3. Comparison between OMA and
NOMA
0 5 10 15 20 25 30 35
10-3
10-2
10
-1
100
Outage
Probability
m = 1
m = 2
m = 3
m = 4
Figure 4. Outage performance versus ϕ1, with
ρ = 10dB
0 5 10 15 20 25 30 35
10-3
10-2
10
-1
100
Outage
Probability
m = 4
m = 1
Figure 5. Outage performance versus threshold
rates, with ϕ1 = 0.05, ϕ2 = 1.95 and ρ = 20dB
5. CONCLUSION
The paper proposed IoT system relying UAV relay to enhance performance of destination. This tech-
nique effectively overcomes the large scale fading between the BS and far user. Moreover, the proposed NOMA
strategy was typically applied for UAV relays and achieved acceptable outage performance. Meanwhile, the
outage probability and throughput closed-form expressions were derived. The derivations and analysis results
showed that the proposed multiple parameters joint consideration can effectively improve the system through-
put and reduce the system outage probability.
Bulletin of Electr Eng  Inf, Vol. 10, No. 1, February 2021 : 241 – 248
Bulletin of Electr Eng  Inf ISSN: 2302-9285 r 247
APENDIX
By invoking (15) into (19), it can be expressed the outage probability as
OPDF
U1
= Pr

|hSR|
2

γth1

|hRU1 |
2
+1

(a1−γth1a2)ρ|hRU1 |
2

(25)
Based on probability density function (PDF) of |hi|
2
is given as f|hi|2 (x) = λRU1
e−λRU1
x
, it can be
rewritten as
OPDF
U1
=
∞
R
0
f|hRU1 |
2 (x)
∞
R
γth1(x+1)
(a1−γth1a2)ρx
f|hRU1 |
2 (y)dxdy
=
∞
R
0

1 − e
−
γth1(x+1)
(a1−γth1a2)ρx

λRU1
e−λRU1
x
dx
(26)
Thus, based on [25, 3.324.1] OPDF
U1
can be obtained as
OPDF
U1
=
∞
R
0

1 − e
−
γth1(x+1)
(a1−γth1a2)ρx

λRU1 e−λRU1
x
dx
= 1 − 2e
−
λSRγth1
(a1−γth1a2)ρ
q
γth1λSRλRU1
(a1−γth1a2)ρ K1

2
q
γth1λRU1
λSR
(a1−γth1a2)ρ
 (27)
It is end of the proof.
ACKNOWLEDGEMENT
The acknowledgment section is optional. The funding source of the research can be put here.
REFERENCES
[1] Y. Zeng, R. Zhang, and T. J. Lim, ”Wireless communications with unmanned aerial vehicles: Opportuni-
ties and challenges,” IEEE Commun. Mag., vol. 54, no. 5, pp. 36-42, May 2016.
[2] A. Osseiran et al., ”Scenarios for 5G mobile and wireless communications: The vision of the METIS
project,” IEEE Commun. Mag., vol. 52, no. 5, pp. 26-35, May 2014.
[3] B. Ji, Y. Wang, B. Xing, Y. Wang, K. Song, C. Li, and R. Zhao, ”Efficient protocol design for device-
to-device communication in ultra dense networks,” Presented at the Int. Symp. Intell. Signal Process.
Commun. Syst. (ISPACS), 2017.
[4] L. Gupta, R. Jain, and G. Vaszkun, ”Survey of important issues in UAV communication networks,” IEEE
Commun. Surveys Tuts., vol. 18, no. 2, pp. 1123-1152, 2nd Quart., 2015.
[5] M. Hua, Y. Wang, Z. Zhang, C. Li, Y. Huang, and L. Yang, ”Power-efficient communication in UAV-aided
wireless sensor networks,” IEEE Commun. Lett., vol. 22, no. 6, pp. 1264-1267, Jun. 2018.
[6] Y. Zeng and R. Zhang, ”Energy-efficient UAV communication with trajectory optimization,” IEEE Trans.
Wireless Commun., vol. 16, no. 6, pp. 3747-3760, Jun. 2017.
[7] C. Li, P. Liu, C. Zou, F. Sun, J. M. Cioffi, and L. Yang, ”Spectral-efficient cellular communications with
coexistent one- and two-hop transmissions,” IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6765-6772,
Aug. 2016.
[8] Dinh-Thuan Do and M.-S. Van Nguyen, ”Device-to-device transmission modes in NOMA network with
and without Wireless Power Transfer,” Computer Communications, vol. 139, pp. 67-77, May 2019.
[9] D.-T. Do and A.-T. Le, ”NOMA based cognitive relaying: Transceiver hardware impairments, relay se-
lection policies and outage performance comparison,” Computer Communications, vol. 146, pp. 144-154,
2019.
[10] D.-T. Do, A.-T. Le and B.-M. Lee, ”On Performance Analysis of Underlay Cognitive Radio-Aware Hybrid
OMA/NOMA Networks with Imperfect CSI,” Electronics, vol. 8, no. 7, 2019.
[11] Dinh-Thuan Do and C.-B. Le, ”Application of NOMA in Wireless System with Wireless Power Transfer
Scheme: Outage and Ergodic Capacity Performance Analysis,” Sensors, vol. 18, no. 10, 2018.
[12] T.-L. Nguyen and Dinh-Thuan Do, ”Exploiting Impacts of Intercell Interference on SWIPT-assisted Non-
orthogonal Multiple Access,” Wireless Communications and Mobile Computing, vol. 2018, 2018.
Employing non-orthogonal multiple access scheme in UAV-based wireless networks (Chi-Bao Le)
248 r ISSN: 2302-9285
[13] D-T. Do et al. ”Wireless power transfer enabled NOMA relay systems: two SIC modes and performance
evaluation,” TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 17, no. 6, pp.
2697-2703, 2019.
[14] Dinh-Thuan Do, Chi-Bao Le, A.-T. Le, ”Cooperative underlay cognitive radio assisted NOMA: secondary
network improvement and outage performance,” TELKOMNIKA Telecommunication, Computing, Elec-
tronics and Control, vol. 17, no. 5, pp. 2147-2154, 2019.
[15] D.-T. Do, M. Vaezi and T.-L. Nguyen, ”Wireless Powered Cooperative Relaying using NOMA with Im-
perfect CSI,” Proc. of IEEE Globecom Workshops (GC Wkshps), pp. 1-6, 2018.
[16] D.-T. Do, A.-T. Le, C.-B. Le and B. M. Lee, ”On Exact Outage and Throughput Performance of Cognitive
Radio based Non-Orthogonal Multiple Access Networks With and Without D2D Link,” Sensors (Basel),
vol. 19, no. 15, 2019.
[17] X. Li, J. Li, Y. Liu, Z. Ding and A. Nallanathan, ”Residual Transceiver Hardware Impairments on Coop-
erative NOMA Networks,” IEEE Transactions on Wireless Communications, vol. 19, no. 1, pp. 680-695,
Jan. 2020.
[18] X. Li, J. Li and L. Li, ”Performance Analysis of Impaired SWIPT NOMA Relaying Networks Over
Imperfect Weibull Channels,” IEEE Systems Journal, vol. 14, no. 1, pp. 669-672, March 2020.
[19] X. Li, M. Liu, C. Deng, P. T. Mathiopoulos, Z. Ding and Y. Liu, ”Full-Duplex Cooperative NOMA
Relaying Systems With I/Q Imbalance and Imperfect SIC,” IEEE Wireless Communications Letters, vol.
9, no. 1, pp. 17-20, Jan. 2020.
[20] X. Li, Qunshu Wang, Hongxing Peng, Hui Zhang, Dinh-Thuan Do, Khaled M. Rabie, Rupak Kharel and
Charles C. Cavalcante, “A Unified Framework for HS-UAV NOMA Network: Performance Analysis and
Location Optimization,” IEEE Access, vol. 8, pp. 13329-13340, 2020.
[21] X. Li, J. Li, L. Li, J. Jin, J. Zhang and D. Zhang, ”Effective Rate of MISO Systems Over κ − µ Shadowed
Fading Channels,” IEEE Access, vol. 5, pp. 10605-10611, 2017.
[22] X. Li, M. Liu, C. Deng, , D. Zhang, X. Gao, K. M. Rabie, R. Kharel, “Joint Effects of Residual Hardware
Impairments and Channel Estimation Errors on SWIPT Assisted Cooperative NOMA Networks,” IEEE
Access, pp.1-15, 2019.
[23] X. Li, M. Huang, C. Zhang, D. Deng, K. M Rabie, Y. Ding, and J. Du, ”Security and Reliability Perfor-
mance Analysis of Cooperative Multi-Relay Systems With Nonlinear Energy Harvesters and Hardware
Impairments,” IEEE Access, vol. 7, pp. 102644-102661, 2019.
[24] J. Li, X. Li, Y. Liu, C. Zhang, L. Li and A. Nallanathan, ”Joint Impact of Hardware Impairments and
Imperfect Channel State Information on Multi-Relay Networks,” IEEE Access, vol. 7, pp. 72358-72375,
2019.
[25] I. S. Gradshteyn and I. M. Ryzhik, ”Table of Integrals, Series and Products,” 6th ed. New York, NY, USA:
Academic Press, 2000.
Bulletin of Electr Eng  Inf, Vol. 10, No. 1, February 2021 : 241 – 248

More Related Content

What's hot

Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alter...
Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alter...Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alter...
Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alter...Mohamed Seif
 
Multiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation PrecodingMultiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation Precodingadeelrazi
 
Telecommunication System Engineering Notes
Telecommunication System Engineering NotesTelecommunication System Engineering Notes
Telecommunication System Engineering NotesHaris Hassan
 
PIMRC 2016 Presentation
PIMRC 2016 PresentationPIMRC 2016 Presentation
PIMRC 2016 PresentationMohamed Seif
 
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...journalBEEI
 
BER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingBER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingIJEEE
 
Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...
Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...
Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...T. E. BOGALE
 
HOSVD-visualization
HOSVD-visualizationHOSVD-visualization
HOSVD-visualizationKeyvan Sadri
 
Downlink signal evaluation of haps m 55 aircraft above malaysian skies
Downlink signal evaluation of haps m 55 aircraft above malaysian skiesDownlink signal evaluation of haps m 55 aircraft above malaysian skies
Downlink signal evaluation of haps m 55 aircraft above malaysian skiesIAEME Publication
 
An analtical analysis of w cdma smart antenna
An analtical analysis of w cdma smart antennaAn analtical analysis of w cdma smart antenna
An analtical analysis of w cdma smart antennamarwaeng
 
MartinDickThesis
MartinDickThesisMartinDickThesis
MartinDickThesisMartin Dick
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkTELKOMNIKA JOURNAL
 
LSQR-Based-Precoding
LSQR-Based-PrecodingLSQR-Based-Precoding
LSQR-Based-PrecodingQian Han
 
Performance of MMSE Denoise Signal Using LS-MMSE Technique
Performance of MMSE Denoise Signal Using LS-MMSE  TechniquePerformance of MMSE Denoise Signal Using LS-MMSE  Technique
Performance of MMSE Denoise Signal Using LS-MMSE TechniqueIJMER
 
Performance of cognitive radio networks with maximal ratio combining over cor...
Performance of cognitive radio networks with maximal ratio combining over cor...Performance of cognitive radio networks with maximal ratio combining over cor...
Performance of cognitive radio networks with maximal ratio combining over cor...Polytechnique Montreal
 
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELEVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELIJCSES Journal
 

What's hot (20)

Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alter...
Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alter...Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alter...
Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alter...
 
Multiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation PrecodingMultiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation Precoding
 
Telecommunication System Engineering Notes
Telecommunication System Engineering NotesTelecommunication System Engineering Notes
Telecommunication System Engineering Notes
 
PIMRC 2016 Presentation
PIMRC 2016 PresentationPIMRC 2016 Presentation
PIMRC 2016 Presentation
 
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
 
BER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingBER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper Coding
 
wcnc05
wcnc05wcnc05
wcnc05
 
MIMO Communications
MIMO CommunicationsMIMO Communications
MIMO Communications
 
Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...
Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...
Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...
 
HOSVD-visualization
HOSVD-visualizationHOSVD-visualization
HOSVD-visualization
 
Downlink signal evaluation of haps m 55 aircraft above malaysian skies
Downlink signal evaluation of haps m 55 aircraft above malaysian skiesDownlink signal evaluation of haps m 55 aircraft above malaysian skies
Downlink signal evaluation of haps m 55 aircraft above malaysian skies
 
An analtical analysis of w cdma smart antenna
An analtical analysis of w cdma smart antennaAn analtical analysis of w cdma smart antenna
An analtical analysis of w cdma smart antenna
 
MartinDickThesis
MartinDickThesisMartinDickThesis
MartinDickThesis
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA network
 
LSQR-Based-Precoding
LSQR-Based-PrecodingLSQR-Based-Precoding
LSQR-Based-Precoding
 
Lecture set 5
Lecture set 5Lecture set 5
Lecture set 5
 
Performance of MMSE Denoise Signal Using LS-MMSE Technique
Performance of MMSE Denoise Signal Using LS-MMSE  TechniquePerformance of MMSE Denoise Signal Using LS-MMSE  Technique
Performance of MMSE Denoise Signal Using LS-MMSE Technique
 
Vblast
VblastVblast
Vblast
 
Performance of cognitive radio networks with maximal ratio combining over cor...
Performance of cognitive radio networks with maximal ratio combining over cor...Performance of cognitive radio networks with maximal ratio combining over cor...
Performance of cognitive radio networks with maximal ratio combining over cor...
 
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELEVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
 

Similar to Employing non-orthogonal multiple access scheme in UAV-based wireless networks

Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...TELKOMNIKA JOURNAL
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
 
Outage performance users located outside D2D coverage area in downlink cellul...
Outage performance users located outside D2D coverage area in downlink cellul...Outage performance users located outside D2D coverage area in downlink cellul...
Outage performance users located outside D2D coverage area in downlink cellul...journalBEEI
 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...journalBEEI
 
System Consideration, Design and Implementation of Point To Point Microwave L...
System Consideration, Design and Implementation of Point To Point Microwave L...System Consideration, Design and Implementation of Point To Point Microwave L...
System Consideration, Design and Implementation of Point To Point Microwave L...ijtsrd
 
V2X communication system with non-orthogonal multiple access: outage performa...
V2X communication system with non-orthogonal multiple access: outage performa...V2X communication system with non-orthogonal multiple access: outage performa...
V2X communication system with non-orthogonal multiple access: outage performa...nooriasukmaningtyas
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...IJCNCJournal
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMATELKOMNIKA JOURNAL
 
On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...
On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...
On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...TELKOMNIKA JOURNAL
 
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...journalBEEI
 
A new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systemsA new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systemsjournalBEEI
 
A low complexity distributed differential scheme based on orthogonal space t...
A low complexity distributed differential scheme based on  orthogonal space t...A low complexity distributed differential scheme based on  orthogonal space t...
A low complexity distributed differential scheme based on orthogonal space t...IJECEIAES
 
Implementation performance analysis of cordic
Implementation performance analysis of cordicImplementation performance analysis of cordic
Implementation performance analysis of cordiciaemedu
 
Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...TELKOMNIKA JOURNAL
 
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...amal algedir
 
Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...IJECEIAES
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...nooriasukmaningtyas
 
Link budget calculation
Link budget calculationLink budget calculation
Link budget calculationHesham Yousef
 

Similar to Employing non-orthogonal multiple access scheme in UAV-based wireless networks (20)

Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
 
1. 20934.pdf
1. 20934.pdf1. 20934.pdf
1. 20934.pdf
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
 
Outage performance users located outside D2D coverage area in downlink cellul...
Outage performance users located outside D2D coverage area in downlink cellul...Outage performance users located outside D2D coverage area in downlink cellul...
Outage performance users located outside D2D coverage area in downlink cellul...
 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...
 
System Consideration, Design and Implementation of Point To Point Microwave L...
System Consideration, Design and Implementation of Point To Point Microwave L...System Consideration, Design and Implementation of Point To Point Microwave L...
System Consideration, Design and Implementation of Point To Point Microwave L...
 
V2X communication system with non-orthogonal multiple access: outage performa...
V2X communication system with non-orthogonal multiple access: outage performa...V2X communication system with non-orthogonal multiple access: outage performa...
V2X communication system with non-orthogonal multiple access: outage performa...
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
 
On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...
On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...
On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...
 
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
 
A new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systemsA new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systems
 
A low complexity distributed differential scheme based on orthogonal space t...
A low complexity distributed differential scheme based on  orthogonal space t...A low complexity distributed differential scheme based on  orthogonal space t...
A low complexity distributed differential scheme based on orthogonal space t...
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Implementation performance analysis of cordic
Implementation performance analysis of cordicImplementation performance analysis of cordic
Implementation performance analysis of cordic
 
Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...
 
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
 
Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
 
Link budget calculation
Link budget calculationLink budget calculation
Link budget calculation
 

More from journalBEEI

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherjournalBEEI
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksjournalBEEI
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkjournalBEEI
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headjournalBEEI
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...journalBEEI
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)journalBEEI
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...journalBEEI
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...journalBEEI
 

More from journalBEEI (20)

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...
 

Recently uploaded

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 

Employing non-orthogonal multiple access scheme in UAV-based wireless networks

  • 1. Bulletin of Electrical Engineering and Informatics Vol. 10, No. 1, February 2021, pp. 241∼248 ISSN: 2302-9285, DOI: 10.11591/eei.v10i1.2102 r 241 Employing non-orthogonal multiple access scheme in UAV-based wireless networks Chi-Bao Le1 , Dinh-Thuan Do 2 1 Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Vietnam 2 Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Vietnam Article Info Article history: Received Oct 27, 2019 Revised Apr 3, 2020 Accepted Jun 25, 2020 Keywords: NOMA Outage Probability UAV ABSTRACT This paper studies the two-hop transmission relying unmanned aerial vehicle (UAV) relays which is suitable to implement in the internet of things (IoT) systems. To en- hance system performance in order to overcome the large scale fading between the base station (BS) and destination as well as achieve the higher spectrum efficiency, where non-orthogonal multiple access (NOMA) strategies were typically applied for UAV relays to implement massive connections transmission. In particular, outage proba- bility is evaluated via signal to noise ratio (SNR) criterion so that the terminal node can obtain reasonable performance. The derivations and analysis results showed that the considered fixed power allocation scheme provides performance gap among two signals at destination.The numerical simulation confirmed the exactness of derived expressions in the UAV assisted system. This is an open access article under the CC BY-SA license. Corresponding Author: Dinh-Thuan Do, Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City, Vietnam. Email: dodinhthuan@tdtu.edu.vn 1. INTRODUCTION Wireless communication technology has pace to adapt demand with rapid development of new tech- niques. The decreasing cost of unmanned aerial vehicle (UAV) network together with the dramatical innovation of UAV-based manufacturing technology provides connections as some difficulties happen. Therefore, some applications such as weather monitoring systems, forest fire prevention technology, man-v-machine are pro- vided by many new UAV applications appeared in the civilian market. In order to implement the UAV relay based IoT networks, wide range of applications of UAV-based network attracts more attentions from community of researchers [1]. Recently, to achieve throughput transmission above 10Gbps, ultra density device connection and millisecond transmission delay, implement of 5G/B5G networks needs UAV assisted communications as reported in [2, 3]. The network coverage expands to 3D interconnection as crucial demand for development of the future communications and it releases the large scale fading regarding very high speed transmission. Moreover, higher cost and difficulty in the construction of cellular stations happen and such situation leads to solutions of the IoT network by employing the UAV relays assisted Communication. UAV-based network benefits to infrastructure development by providing itss convenient implement and lower cost, high-altitude assisted transmission [4, 5]. The main advantages of the UAV relay assisted communications are reducing the obstruction from buildings, mountains and archieving the higher line of sight (LoS) transmission effect [6, 7]. Journal homepage: http://beei.org
  • 2. 242 r ISSN: 2302-9285 Due to ability of massive connections and higher spectrum efficiency, NOMA has attracted great research interest from both academia and industry [8–24]. Since users aware on imperfect channel state infor- mation (CSI), the author studied the impact of imperfect CSI on the performance of NOMA in [15]. In [16], the throughput aspects of the cognitive radio as applying NOMA techniques were discussed and compared. 2. SYSTEM MODEL Figure 1 shows system model containing the two-hop transmission using UAV relay communication model. Two UAV relays operate in half duplex and DF mode to signal forwarding, while separated signal is detected at destination. The terminal IoT node receives signal from two links as shown in Figure 1. Typically, the obstacles or blockage of urban buildings and mountains limit quality of the communication between the base station BS and terminal node D, then the UAV relays are implemented to realize assisted communication. The destination user needs two phases to perform its the transmission process. In the first phase, the BS transmits mixture signal to the two UAV relay nodes R1, R2. The channels hi between the BS and the UAV relays follow Nakagami-m distribution. D R1 R2 1 1 2 2 S S P x P x    1 1 2 2 S S P x P x    1 1 ˆ R P x  2 2 ˆ R P x  BS Figure 1. System model of UAV-assisted NOMA. The received signal at UAV relays are given as yi = hi √ ϕ1PSx1 + √ ϕ2PSx2 , i ∈ {1, 2}. (1) The signal to noise ratio (SNR) is used to dectect x2 as ΓR1,x2 = ϕ2ρ |h1| ϕ1ρ |h1| + 1 , (2) where ρ = PS N0 = PR N0 is the transmit signal to noise radio (SNR). After SIC happens, SNR is given to detect signal x1 as ΓR1,x1 = ϕ1ρ |h1| . (3) Similarly, SNR at R2 to detect x2 is given as ΓR2,x2 = ϕ2ρ |h2| ϕ1ρ |h2| + 1 . (4) Next, we will introduce the channel model of Ri → D link. In general, the UAV coverage is a circular cell and the UAV is located at the vertical center. Thus, the channel vector of Ri → D link can be expressed as Bulletin of Electr Eng Inf, Vol. 10, No. 1, February 2021 : 241 – 248
  • 3. Bulletin of Electr Eng Inf ISSN: 2302-9285 r 243 gi = Liḡi , i ∈ {1, 2}, (5) where the free space loss of the path Li is given by Li = λu 4π q d2 Ri + d2 h , (6) where dh and dRi denote the height of UAV relay and the distance from the center of two UAV relay’s to D, respectively, λu represents the wavelength. Then, in the second phase of communication, each UAV relay forwards detected symbols to the des- tination (uplink-NOMA) and the received signal at user is given as yD = p PR ( √ ϕ1x̂1L1ḡ1 + √ ϕ2x̂2L2ḡ2) . (7) where PR is the normalized transmission powers at two relay’s It can be computed SNR at user D to detect signal x2 is ΓD,x2 = ρϕ2L−2 2 |g2| 2 ρϕ1L−2 1 |g1| 2 + 1 . (8) Then, SNR at user D is calculated to detect signal x1 is ΓD,x1 = ρϕ1L−2 1 |g1| 2 . (9) 3. PERFORMANCE ANALYSIS 3.1. Outage probability of x1 At destination, user D needs detect its signals. However, these signals are evaluated via outage proba- bility. Such outage is defined as probability to SNR less than the pre-defined threshold SNR. We first consider outage performance of x1 as below: Px1 = Pr (ΓR1,x2 ε2 ∪ ΓR1,x1 ε1 ∪ ΓD,x2 ε2 ∪ ΓD,x1 ε1) =1 − Pr (ΓR1,x2 ≥ ε2 ∪ ΓR1,x1 ≥ ε1 ∪ ΓD,x2 ≥ ε2 ∪ ΓD,x1 ≥ ε1) =1 − Pr (|h1| ≥ χ) | {z } A1 Pr |g2| 2 ≥ δ|g1| 2 + $2, |g1| 2 ≥ $1 | {z } A2 , (10) where ε1 = 22R1 − 1 with R1 being the target rate at D to detect x1, ε2 = 22R2 − 1 with R2 being the target rate at D to detect x2, χ = max ε2 ρ(ϕ2−ε2ϕ1) , ε1 ϕ1ρ , δ = ε2ϕ1L−2 1 ϕ2L−2 2 , $1 = ε1 ρϕ1L−2 1 and $2 = ε2 ρϕ2L−2 2 Let Zi = n |hi| 2 , |gi| 2 o , i ∈ {1, 2} and we set, The CDFs and PDFs of Z FZi (x) = 1 − e−µzi x mzi −1 X s=0 µs zi xs s! , (11) and fZi (x) = µ mZi Zi xmZi −1 e−µZi x Γ (mZi ) , (12) Employing non-orthogonal multiple access scheme in UAV-based wireless networks (Chi-Bao Le)
  • 4. 244 r ISSN: 2302-9285 where µzi = mzi λzi A1 = Pr (|h1| ≥ χ) =1 − F|h1| (χ) =e−µh1 χ mh1 −1 X a=0 µa h1 χa a! . (13) Then, A2 is given by A2 = Pr |g2| 2 ≥ δ|g1| 2 + $2, |g1| 2 ≥ $1 = ∞ Z $1 f|g1|2 (x) h 1 − F|g2|2 (δx + $2) i dx = mg2 −1 X d=0 µd g2 µ mg1 g1 e−µg2 $2 d!Γ (mg1 ) ∞ Z $1 xmg1 −1 e−x(µg1 +µg2 δ)(δx + $2) d dx = mg2 −1 X d=0 d X t=0 d t µd g2 µ mg1 g1 $d−t 2 δt e−µg2 $2 d!Γ (mg1 ) ∞ Z $1 xmg1 +t−1 e−x(µg1 +µg2 δ)dx. (14) Applying [[23], (3.351.2)], A2 is given by A2 = mg2 −1 X d=0 d X t=0 mg1 +t−1 X k=0 d t µd g2 µ mg1 g1 $d−t 2 δt Γ (mg1 + t) $k 1 e−µg2 $2−$1(µg1 +µg2 δ) d!k!Γ (mg1 ) (µg1 + µg2 δ) mg1 +t−k (15) where Γ (x) = (x − 1)! is the gamma function. Next, substituting (15) and (13) into (10), Px1 is expressed by Px1 =1 − e−µh1 χ mh1 −1 X a=0 mg2 −1 X d=0 d X t=0 mg1 +t−1 X k=0 d t µd g2 µ mg1 g1 µa h1 χa $d−t 2 δt Γ (mg1 + t) $k 1 a!d!k!Γ (mg1 ) × e−µg2 $2−$1(µg1 +µg2 δ) (µg1 + µg2 δ) mg1 +t−k . (16) When ρ → ∞, by using e−x ≈ 1 − x so the asymptotic of P∞ x1 is formulated by P∞ x1 =1 − (1 − µh1 χ) mh1 −1 X a=0 mg2 −1 X d=0 d X t=0 mg1 +t−1 X k=0 d t µd g2 µ mg1 g1 µa h1 χa $d−t 2 δt Γ (mg1 + t) $k 1 a!d!k!Γ (mg1 ) × [1 − µg2 $2 − $1 (µg1 + µg2 δ)] (µg1 + µg2 δ) mg1 +t−k . (17) According to (8), we have lim ρ→∞ ΓD,x2 = ϕ2L−2 2 |g2|2 ϕ1L−2 1 |g1|2 the approximate of Papp. x1 and Papp. x2 are given by Papp. x1 = Papp. x2 = mg2 −1 X d=0 µd g2 µ mg1 g1 δd Γ (mg1 + d) d!Γ (mg1 ) (µg1 + µg2 δ) mg1 +d . (18) Bulletin of Electr Eng Inf, Vol. 10, No. 1, February 2021 : 241 – 248
  • 5. Bulletin of Electr Eng Inf ISSN: 2302-9285 r 245 3.2. Outage probability of x2 Similarly, outage performance of x2 can be formulated by Px2 = Pr (ΓR2,x2 ε2 ∪ ΓD,x2 ε2) =1 − Pr (ΓR2,x2 ≥ ε2, ΓD,x2 ≥ ε2) =1 − Pr (|h2| ≥ ν) | {z } B1 Pr |g2| 2 ≥ δ|g1| 2 + $2 | {z } B2 , (19) where ν = ε2 ρ(ϕ2−ε2ϕ1) We need compute each outage component as B1 = Pr (|h2| ≥ ν) =1 − F|h2| (ν) =e−µh2 ν mh2 −1 X b=0 µb h2 νb b! . (20) Then, we continue to compute the second term as B2 = Pr |g2| 2 ≥ δ|g1| 2 + $2 = ∞ Z 0 f|g1|2 (x) h 1 − F|g2|2 (δx + $2) i dx = mg2 −1 X d=0 d X t=0 d t µd g2 µ mg1 g1 δt $d−t 2 e−µg2 $2 d!Γ (mg1 ) ∞ Z 0 xmg1 +t−1 e−x(µg1 +µg2 δ)dx. (21) Based on [[17], (3.351.3)], B2 is given by B2 = mg2 −1 X d=0 d X t=0 d t µd g2 µ mg1 g1 δt $d−t 2 Γ (mg1 + t) e−µg2 $2 d!Γ (mg1 ) (µg1 + µg2 δ) mg1 +t . (22) Substituting (22) and (20) into (19), Px2 is given by Px2 = 1 − e−µh2 ν mh2 −1 X b=0 mg2 −1 X d=0 d X t=0 d t µb h2 νb µd g2 µ mg1 g1 δt $d−t 2 Γ (mg1 + t) e−µg2 $2 b!d!Γ (mg1 ) (µg1 + µg2 δ) mg1 +t . (23) Corresponding to formula (17) the asymptotic of P∞ x2 is given by P∞ x2 = 1 − (1 − µh2 ν) mh2 −1 X b=0 mg2 −1 X d=0 d X t=0 d t µb h2 νb µd g2 µ mg1 g1 δt $d−t 2 Γ (mg1 + t) (1 − µg2 $2) b!d!Γ (mg1 ) (µg1 + µg2 δ) mg1 +t . (24) 4. NUMERICAL RESULTS We set fading parameter m = mh1 = mh2 = mg1 = mg2 = 2 and channel gains as λ = λh1 = λh2 = λg1 = λg2 = 1. The power allocation coefficients of NOMA’s users are ϕ1 = 0.1 and ϕ1 = 0.9. The target rates are R1 and R2 and they are set to be R1 = R2 = 0.5. The times of Monte Carlo simulation 107 . The height of UAV dh = 300 m. The distance between R1 → D and R2 → D are dR1D = 200 m and dR1D = 100 m, respectively. Employing non-orthogonal multiple access scheme in UAV-based wireless networks (Chi-Bao Le)
  • 6. 246 r ISSN: 2302-9285 Figure 2 shows outage performance versus transmit SNR. We consider four cases of m. As can be seen from such outage performance, asymptotic curves are very matched with exact curves. Signal x2 exhibits better outage probability compared with x1 since different power allocated to each signal. The simulation results are also very tight with the analytical results. m = 4 is considered as the best case among these curves. Figure 3 confirms that NOMA benefits to outage performance of signal x2 as it is better than OMA method. Figure 4 indicates the optimal outage for signal x1 and it happens at ϕ1 = 0.25. Higher threshold SNR results in worse outage performance of two signals as observation from Figure 5. 0 5 10 15 20 25 30 35 10-3 10-2 10 -1 10 0 Outage Probability m = 1 m = 2 m = 3 m = 4 Figure 2. Outage performance of x1 and x2 versus transmit SNR 0 5 10 15 20 25 30 35 10-3 10-2 10 -1 10 0 Outage Probability m = 4 m = 1 Figure 3. Comparison between OMA and NOMA 0 5 10 15 20 25 30 35 10-3 10-2 10 -1 100 Outage Probability m = 1 m = 2 m = 3 m = 4 Figure 4. Outage performance versus ϕ1, with ρ = 10dB 0 5 10 15 20 25 30 35 10-3 10-2 10 -1 100 Outage Probability m = 4 m = 1 Figure 5. Outage performance versus threshold rates, with ϕ1 = 0.05, ϕ2 = 1.95 and ρ = 20dB 5. CONCLUSION The paper proposed IoT system relying UAV relay to enhance performance of destination. This tech- nique effectively overcomes the large scale fading between the BS and far user. Moreover, the proposed NOMA strategy was typically applied for UAV relays and achieved acceptable outage performance. Meanwhile, the outage probability and throughput closed-form expressions were derived. The derivations and analysis results showed that the proposed multiple parameters joint consideration can effectively improve the system through- put and reduce the system outage probability. Bulletin of Electr Eng Inf, Vol. 10, No. 1, February 2021 : 241 – 248
  • 7. Bulletin of Electr Eng Inf ISSN: 2302-9285 r 247 APENDIX By invoking (15) into (19), it can be expressed the outage probability as OPDF U1 = Pr |hSR| 2 γth1 |hRU1 | 2 +1 (a1−γth1a2)ρ|hRU1 | 2 (25) Based on probability density function (PDF) of |hi| 2 is given as f|hi|2 (x) = λRU1 e−λRU1 x , it can be rewritten as OPDF U1 = ∞ R 0 f|hRU1 | 2 (x) ∞ R γth1(x+1) (a1−γth1a2)ρx f|hRU1 | 2 (y)dxdy = ∞ R 0 1 − e − γth1(x+1) (a1−γth1a2)ρx λRU1 e−λRU1 x dx (26) Thus, based on [25, 3.324.1] OPDF U1 can be obtained as OPDF U1 = ∞ R 0 1 − e − γth1(x+1) (a1−γth1a2)ρx λRU1 e−λRU1 x dx = 1 − 2e − λSRγth1 (a1−γth1a2)ρ q γth1λSRλRU1 (a1−γth1a2)ρ K1 2 q γth1λRU1 λSR (a1−γth1a2)ρ (27) It is end of the proof. ACKNOWLEDGEMENT The acknowledgment section is optional. The funding source of the research can be put here. REFERENCES [1] Y. Zeng, R. Zhang, and T. J. Lim, ”Wireless communications with unmanned aerial vehicles: Opportuni- ties and challenges,” IEEE Commun. Mag., vol. 54, no. 5, pp. 36-42, May 2016. [2] A. Osseiran et al., ”Scenarios for 5G mobile and wireless communications: The vision of the METIS project,” IEEE Commun. Mag., vol. 52, no. 5, pp. 26-35, May 2014. [3] B. Ji, Y. Wang, B. Xing, Y. Wang, K. Song, C. Li, and R. Zhao, ”Efficient protocol design for device- to-device communication in ultra dense networks,” Presented at the Int. Symp. Intell. Signal Process. Commun. Syst. (ISPACS), 2017. [4] L. Gupta, R. Jain, and G. Vaszkun, ”Survey of important issues in UAV communication networks,” IEEE Commun. Surveys Tuts., vol. 18, no. 2, pp. 1123-1152, 2nd Quart., 2015. [5] M. Hua, Y. Wang, Z. Zhang, C. Li, Y. Huang, and L. Yang, ”Power-efficient communication in UAV-aided wireless sensor networks,” IEEE Commun. Lett., vol. 22, no. 6, pp. 1264-1267, Jun. 2018. [6] Y. Zeng and R. Zhang, ”Energy-efficient UAV communication with trajectory optimization,” IEEE Trans. Wireless Commun., vol. 16, no. 6, pp. 3747-3760, Jun. 2017. [7] C. Li, P. Liu, C. Zou, F. Sun, J. M. Cioffi, and L. Yang, ”Spectral-efficient cellular communications with coexistent one- and two-hop transmissions,” IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6765-6772, Aug. 2016. [8] Dinh-Thuan Do and M.-S. Van Nguyen, ”Device-to-device transmission modes in NOMA network with and without Wireless Power Transfer,” Computer Communications, vol. 139, pp. 67-77, May 2019. [9] D.-T. Do and A.-T. Le, ”NOMA based cognitive relaying: Transceiver hardware impairments, relay se- lection policies and outage performance comparison,” Computer Communications, vol. 146, pp. 144-154, 2019. [10] D.-T. Do, A.-T. Le and B.-M. Lee, ”On Performance Analysis of Underlay Cognitive Radio-Aware Hybrid OMA/NOMA Networks with Imperfect CSI,” Electronics, vol. 8, no. 7, 2019. [11] Dinh-Thuan Do and C.-B. Le, ”Application of NOMA in Wireless System with Wireless Power Transfer Scheme: Outage and Ergodic Capacity Performance Analysis,” Sensors, vol. 18, no. 10, 2018. [12] T.-L. Nguyen and Dinh-Thuan Do, ”Exploiting Impacts of Intercell Interference on SWIPT-assisted Non- orthogonal Multiple Access,” Wireless Communications and Mobile Computing, vol. 2018, 2018. Employing non-orthogonal multiple access scheme in UAV-based wireless networks (Chi-Bao Le)
  • 8. 248 r ISSN: 2302-9285 [13] D-T. Do et al. ”Wireless power transfer enabled NOMA relay systems: two SIC modes and performance evaluation,” TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 17, no. 6, pp. 2697-2703, 2019. [14] Dinh-Thuan Do, Chi-Bao Le, A.-T. Le, ”Cooperative underlay cognitive radio assisted NOMA: secondary network improvement and outage performance,” TELKOMNIKA Telecommunication, Computing, Elec- tronics and Control, vol. 17, no. 5, pp. 2147-2154, 2019. [15] D.-T. Do, M. Vaezi and T.-L. Nguyen, ”Wireless Powered Cooperative Relaying using NOMA with Im- perfect CSI,” Proc. of IEEE Globecom Workshops (GC Wkshps), pp. 1-6, 2018. [16] D.-T. Do, A.-T. Le, C.-B. Le and B. M. Lee, ”On Exact Outage and Throughput Performance of Cognitive Radio based Non-Orthogonal Multiple Access Networks With and Without D2D Link,” Sensors (Basel), vol. 19, no. 15, 2019. [17] X. Li, J. Li, Y. Liu, Z. Ding and A. Nallanathan, ”Residual Transceiver Hardware Impairments on Coop- erative NOMA Networks,” IEEE Transactions on Wireless Communications, vol. 19, no. 1, pp. 680-695, Jan. 2020. [18] X. Li, J. Li and L. Li, ”Performance Analysis of Impaired SWIPT NOMA Relaying Networks Over Imperfect Weibull Channels,” IEEE Systems Journal, vol. 14, no. 1, pp. 669-672, March 2020. [19] X. Li, M. Liu, C. Deng, P. T. Mathiopoulos, Z. Ding and Y. Liu, ”Full-Duplex Cooperative NOMA Relaying Systems With I/Q Imbalance and Imperfect SIC,” IEEE Wireless Communications Letters, vol. 9, no. 1, pp. 17-20, Jan. 2020. [20] X. Li, Qunshu Wang, Hongxing Peng, Hui Zhang, Dinh-Thuan Do, Khaled M. Rabie, Rupak Kharel and Charles C. Cavalcante, “A Unified Framework for HS-UAV NOMA Network: Performance Analysis and Location Optimization,” IEEE Access, vol. 8, pp. 13329-13340, 2020. [21] X. Li, J. Li, L. Li, J. Jin, J. Zhang and D. Zhang, ”Effective Rate of MISO Systems Over κ − µ Shadowed Fading Channels,” IEEE Access, vol. 5, pp. 10605-10611, 2017. [22] X. Li, M. Liu, C. Deng, , D. Zhang, X. Gao, K. M. Rabie, R. Kharel, “Joint Effects of Residual Hardware Impairments and Channel Estimation Errors on SWIPT Assisted Cooperative NOMA Networks,” IEEE Access, pp.1-15, 2019. [23] X. Li, M. Huang, C. Zhang, D. Deng, K. M Rabie, Y. Ding, and J. Du, ”Security and Reliability Perfor- mance Analysis of Cooperative Multi-Relay Systems With Nonlinear Energy Harvesters and Hardware Impairments,” IEEE Access, vol. 7, pp. 102644-102661, 2019. [24] J. Li, X. Li, Y. Liu, C. Zhang, L. Li and A. Nallanathan, ”Joint Impact of Hardware Impairments and Imperfect Channel State Information on Multi-Relay Networks,” IEEE Access, vol. 7, pp. 72358-72375, 2019. [25] I. S. Gradshteyn and I. M. Ryzhik, ”Table of Integrals, Series and Products,” 6th ed. New York, NY, USA: Academic Press, 2000. Bulletin of Electr Eng Inf, Vol. 10, No. 1, February 2021 : 241 – 248