SlideShare a Scribd company logo
1 of 9
Download to read offline
Bulletin of Electrical Engineering and Informatics
Vol. 9, No. 1, February 2020,pp. 256~264
ISSN: 2302-9285,DOI: 10.11591/eei.v9i1.1651  256
Journal homepage: http://beei.org
Outage probability analysis of EH NOMA system network over
Rayleigh fading channel using selection combining
at the receiver
Phu Tran Tin1, Minh Tran2, Tran Thanh Trang3
1
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City, Vietnam
2
Optoelectronics Research Group, Faculty of Electrical and Electronics Engineering,
Ton Duc Thang University, Vietnam
3
National Key Laboratory of Digital Control and System Engineering, Vietnam
Article Info ABSTRACT
Article history:
Received Jun 4, 2019
Revised Sep 26, 2019
Accepted Nov 10, 2019
Non-orthogonal multiple access (NOMA) with advantages such as superior
spectral efficiency has been considered as a promising multiple access
technique for the fifth-generation (5G) mobile networks. In this research,
we propose energy harvesting (EH) NOMA system relaying network over
Rayleigh fading channel using selection combining at the receiver.
Firstly, we investigate the system performance in terms of the closed-form
expression of the outage probability (OP). Here we compare the OP of two
destination users of the proposed system. Finally, all the results is convinced
by the Monte Carlo simulation. From the results, we can confirm that all
the analytical and simulation results are the same in connection with
the primary system parameters.
Keywords:
Energy harvesting (EH)
Monte carlo
Outage probability (OP)
Power beacon
Relaying network This is an open access article under the CC BY-SA license.
Corresponding Author:
Minh Tran,
Optoelectronics Research Group,
Faculty of Electrical and Electronics Engineering,
Ton Duc Thang University, Ho Chi Minh City, Vietnam.
Email: tranhoangquangminh@tdtu.edu.vn
1. INTRODUCTION
Non-orthogonal multiple access (NOMA) with advantages such as superior spectral efficiency has
been considered as a promising multiple access technique for the fifth-generation (5G) mobile
networks [1-6]. In comparison with the traditional water-filling power allocation strategy, NOMA can
transfermore power to the users in the worse channelconditions. It leads to a better trade-off between system
throughput and user fairness. From the previous researches, authors investigated the impact of user pairing o n
downlink NOMA systems as in [7], the authors in [8] have considered the power allocation with the max-min
fairness criterion of the model system. An uplink NOMA scheme with joint power and subcarrier allocations
hasbeen proposed and investigated in [9]. In [10], a cooperation-based NOMA scheme for coordinated direct
and relay transmissions is studied. Furthermore, a diversity-oriented detection mechanism forthe cooperative
relaying system using NOMA is considered by authors in [11]. The performance of transmit antenna
selection for NOMA assisted multiple-input-multiple-output (MIMO) relay networks is presented in [12].
Then inspired by user collaboration,a cooperative NOMA transmission scheme is presented in [13].
In this research, we propose energy harvesting (EH) NOMA network system over the Rayleigh
fading channel using selection combining at the receiver. In the first stage, we investigate and derive
Bulletin of Electr Eng & Inf ISSN: 2302-9285 
Outage probability analysisof eh noma system network over rayleigh fading channel… (Phu Tran Tin)
257
the closed-form expression of the outage probability (OP) of the model system by Monte Carlo simulation.
Then the comparison of the OP of two destination users is investigated in connection with the primary system
parameters. Finally, all the results are convinced by the Monte Carlo simulation. From the results, we can
convince that all the analytical and simulation results are the same in connection with the primary system
parameters.The main contributions of this research are listed as:
- The EH NOMA network system over the Rayleigh fading channel using selection combining
at the receiver is proposed.
- The closed-form expression of the system OP is investigated and derived.
- The comparison of the OP of two destination users is investigated.
- All the results are convinced by the Monte Carlo simulation.
2. SYSTEM MODEL
The EH NOMA network system over the Rayleigh fading channel using selection combining
at the receiver is drawn in Figure 1. In this system model, we denote Source is S, Relay is R, D1 and D2
are two Destination nodes. We assume that all links between them (i.e., S-to-D1,2, S-to-R, and R-to-D1,2)
are available. The Rayleigh fading channel coefficients of S-to-D1,2, S-to-R, and R-to-D1,2 links are denoted
as hSD1,2, hSR, and hRD1,2, respectively as shown in Figure 1. The energy harvesting and information
processing (IT) are illustrated in Figure 2. In this protocol, the transmission block time T, which consists
of three-time slots. In the first-time slot αT (α is the time switching factor, 0<α<1), the relay harvests energy
from the source node S. In the second interval time (1-α)T/2, the source S transfers the information to
R and D1,2 at the same time. Finally, the relay node R transfers the information to the destination nodes
D1,2 in the remaining time slot (1-α)T/2.
EH
IT
S R
D1
1
Rd
h
SR
h
D2
2
Sd
h
1
Sd
h
2
Rd
h
IT
RàD1,D2
IT
SàR, D1, D2
αT (1-α)T/2
T
EH at R
(1-α)T/2
Figure 1. System model Figure 2. The time switching protocol
Energy harvesting phase
In the first slot time αT, we formulate the received signal as:
r sr s s r
y h P x n
= + (1)
The received energy can be computed as:
2
r sr s
E T h P

= (2)
Where 0 1

  is the energy conversion efficiency.
The average transmit power at the R node can be calculated as:
( )
2
1 / 2
s
r sr s
E
P h P
T


= =
−
(3)
Where we denote
2
1



=
−
.
 ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 1, February 2020 : 256 – 264
258
Information transmission
In the second slot time, S transmits the superposed signal 1 1 2 2
s s
a P x a P x
+ to relay, D1 and D2
according to the NOMA scheme [1]. a1, a2 are the power allocation coefficients for D1 and D2, where we
assume 1 2 2 1
1,
a a a a
+ =  , x1 and x2 are the transmit signal for D1 and D2, respectively. Hence, the received
signal at the R node, D1 and D2 can be expressed as respectively [14].
( )
1 1 2 2
r sr s s r
y h a P x a P x n
= + + (4)
( )
1 1 1
1 1 2 2
D sd s s d
y h a P x a P x n
= + + (5)
( )
2 2 2
1 1 2 2
D sd s s d
y h a P x a P x n
= + + (6)
Where 1 2
,
d d
n n are the additive white Gaussian noise (AWGN) at theD1 and D2 with zero-mean and variance
N0, respectively. From (6), we separate the received signal at the D2 into two parts included signal and noise
part for D2 to detect x1.
2 2 2 2
2 2 1 1
D sd s sd s d
signal noise
y h a P x h a P x n
= + + (7)
Hence, the received signal to interference and noise ratio (SINR) for D2 to detect x1 is given as:
 
 
2 2
2
2 2
2 2
2
2 2
2 2
2
1 0 1 1
sd s sd
sd
sd s sd
signal h a P h a
noise h a P N h a




= = =
 + +
(8)
Where
0
s
P
N
 = is the transmit signal to noise ratio (SNR).
From (5), SIC is first used for D1 by detecting and decoding the information of D2.
Hence, the received signal at the D1 can be rewritten as:
1 1 1 1
2 2 1 1
D sd s sd s d
signal noise
y h a P x h a P x n
= + + (9)
Then, the received SINR at D1 is given by:
1
21
1
2
2
2
1 1
sd
sd
sd
h a
h a



=
+
(10)
After the far user message is decoded, D1 can decode its own information with the SINR
asfollowing
1 1
2
1
sd sd
h a
 
= (11)
During the third slot time, the relaying node will amplify the received signal and forward to D1 and
D2 with the amplifying factor 2
0
r r
r s sr
x P
y P h N
 = =
+
. The received signals at the D1 and D2
are expressed as,respectively.
Bulletin of Electr Eng & Inf ISSN: 2302-9285 
Outage probability analysisof eh noma system network over rayleigh fading channel… (Phu Tran Tin)
259
1 1 1 1 1
rd rd r rd rd r rd
y h x n h y n

= + = + (12)
Substituting (4) into (12)
( )
1 1 1
1 1 2 2
rd rd sr s s r rd
y h h a P x a P x n n
  
= + + +
 
(13)
And
( )
2 2 2 2 2
2 2 2
1 1 2 2
rd rd r rd rd r rd
rd sr s s rd r rd
y h x n h y n
h h a P x a P x h n n

 
= + = +
= + + +
(14)
Where 1 2
,
rd rd
n n was denoted the AWGN at D1 and D2, respectively. From (14), the received SINR for D2
to detect x2 is given as:
 
 
2
2
2 2
2
2 2
2
2 2
2 2 2
1 1/
sr rd
rd
sr rd rd
signal h h a
noise h h a h


 

= =
 + +
(15)
Using the fact thatN0<<Pr,hence, (15) can be rewritten as:
2
2
2 2
2
2 2
2
2
2
2 2
2 2
1
2
2
2
2 2
2
1
1/
1/
sr rd
rd
sr rd rd
sr rd
sr rd rd
h h a
h h a h
h h a
h h a h


 

 
=
+ +

+ +
(16)
The received SINR when D1 first detect D2’s information is given by:
1
21
1 1
2
2
2
2 2
2
1 1/
sr rd
rd
sr rd rd
h h a
h h a h


 

+ +
(17)
Applying SIC operation,the received SINR for D1 is given by:
1
1
1
2
2
1
2
1/
sr rd
rd
rd
h h a
h




+
(18)
3. SYSTEM PERFORMANCE ANALYSIS
The outage probability (OP) of the destination node D2 can be given by:
( )
( ) ( )
2 2 2
2 2
1
02
02 02
Pr max ,
Pr Pr
D sd rd
sd rd
OP   
   
 
= 
 
=  
(19)
Where 2
2
02 2 1
R
 = − with R2 being the target rate at the D2. From (8), we have:
 ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 1, February 2020 : 256 – 264
260
( )
 
( )
 
2
2
2
2
2
2
2
02 02
2
1
2
2 02 1 02
02
2 02 1
2 02 1
2 02 1
Pr Pr
1
Pr
1 exp ,
1,
sd
sd
sd
sd
sd
h a
h a
h a a
if a a
a a
if a a

  

  
 

 

 
 
 = 
 
+
 
= − 
  
− − 
  
 
= −
  



(20)
Where 2
sd
 is the mean of the random variable (RV) 2
2
sd
h . From (16), we can calculate the second
probability of (19)
( )
( )
 
2
2
2 2
1 1
2
02
2
2
2
02
2 2
2
1
1 2 2
02
1 2 1 2
02
2 1 2 02 1 1 02
02
1 2 1
1 2 02 1 1 02
0
02
Pr
Pr
1/
Pr
1/
Pr
Pr
1 exp
rd
sr rd
sr rd rd
rd
sr
h h a
h h a h
a
a
a a
f d f d
a a

 

 


 
 

   

      


  
      
 




 
 
=  =
 
+ +
 
 
 =
 
+ +
 
 
− −  =
 
 
 
+  =
 
 
− −
 
− −
 
  1 1
1 2 02 1 1 02
exp( )
sr d
a a

  
     

 
−
 
 
− −
 

(21)
Where we denote
2
2
2
02
1 2
2 02 1
, ,
sr rd
h h
a a

  
  
= = =
−
, sr
 and 2
rd
 are the mean of RV 2
2
2
,
sr rd
h h , respectively.
By changing a variable 02
1 2 02 1 1 02 1
02
( )
x
x a a
 
      

+
= − −  = , (21) can be rewritten as:
( ) ( )
2
2
02
02
02
02
0
exp
Pr 1
exp exp
sr sr
rd
rd sr x
dx
x
   
 

   
 

−
 = −
   
− −
   
 
 

(22)
Apply eq (3.324,1) of [15], (22) can be reformulated as:
( ) ( )
2
2 2
02
1
Pr 1 2exp
2
rd sr
sr rd sr rd
K
   
     
 
 = − −
 
 
 
 
 
(23)
Where ( )
v
K • is the modified Bessel function of the second kind and vth order. Substituting (20) and (23) into
(19), finally, we can obtain:
( )
 
( )
2 2
2 2
1
1
1 exp
1 2exp 2
D sd
sr rd sr rd
sr
OP
K
 
     
 
 
= − −
 
 
 
 
− −  
 
 
 
 
 
(24)
Bulletin of Electr Eng & Inf ISSN: 2302-9285 
Outage probability analysisof eh noma system network over rayleigh fading channel… (Phu Tran Tin)
261
Hence, the outage probability (OP) of the destination D1 can be given by:
( )
( )
( )
( )
1 21 1
21 1
21 1
21 1
1
02 01
02 01
02 01
02 01 1 2
Pr ,
Pr ,
1 Pr ,
1 Pr ,
D sd sd
rd rd
sd sd
rd rd
OP
P P
   
   
   
   
=  
  
 
= −   
 
 
−   = 
 
(25)
Where ( )
21 1
1 02 01
1 Pr ,
sd sd
P    
 
= −  
 
, ( )
21 1
2 02 01
1 Pr ,
rd rd
P    
 
= −  
 
. And 1
2
01 2 1
R
 = − with R1 being the target
rate at the D1 From (10) and (11), P1 can be calculated as:
( )
1
1
1
1 1
1
1 1
2
2
2
1 02 1 01
2
1
2 2
02 01
2 02 1 1
2
02 01
2 02 1 1
2
1 Pr ,
1
1 Pr ,
1 Pr max ,
Pr 1 exp
sd
sd
sd
sd sd
sd
sd sd
h a
P h a
h a
h h
a a a
h
a a a
h

  

 
   
 
   

 
 
 
 
= −  
 
 
+
 
 
 
 
= −  
 
−
 
 
 
 
= − 
 
 
−
 
 
 
 
=   = − − 
 
 
(26)
Where 1
sd
 is the mean of RV 1
2
sd
h and 02 01
2 02 1 1
max ,
a a a
 
   
 
 =  
−
 
. From (17) and (18), P2 can be
calculated as:
( ) ( )
1
1 1
1
1
1 3
1
2
2
2
2 2
2
1
2 2
2
1
02 01
2
3 1
1
3 1
1
3 1
1
1 1 3 3
/
1/
1 Pr
,
1/
/
1 Pr ,
/
Pr ,
/
1 Pr ,
1
1 1
sr rd
sr rd rd
sr rd
rd
h h a
h h a h
P
h h a
h
A
A
A
B
B
B
f d f d
 



 

 


 


 


 

   
 


−
 
 
 
+ +
 
= −  
 
  
 
+
 
 
= −  
 
−
 
 
  
 
−
 
 

= −   
 
−
 
= −
= −
 
( )
( )
( )
3 1
1
1 1
1
1 1
1
/
/
1 exp exp
rd
sr sr
F f d
d
 

 

 
   





 
 

−
 
 
−
 
 
 

 
= − − −
 
−
 
 


(27)
 ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 1, February 2020 : 256 – 264
262
Where
( )
1
2
2
1 3
02 01
2 02 1 1
, ,
, , max ,
sr rd
h h
A B A B
a a a
 
 
   
= =
= =  =
−
. And 1
,
sr rd
  are the mean of RV
2
sr
h , 1
2
rd
h ,
respectively changing variable 1
y 
= −, (27) can be rewritten as:
( )
( )
1
1
2
0
0
1 exp exp
1 exp exp
rd
sr sr
rd
sr sr sr
P y dy
y
y dy
y

 


  




 
= − − − +
 
   
 

 
= − −  − −
 
 


(28)
Apply equation (3.324,1)of [table of integral], (22) can be reformulated as:
( ) 1 1
2 1
1 2exp 2
sr rd sr rd
sr
P K
   

 
 
 
 
= − −   
 
 
(29)
where ( )
v
K • is the modified Bessel function of the second kind and vth order. Substituting (26) and (29)
into (25), finally, the outage probability of D1 can be claimed as:
( )
( )
1 1
1 1
1
1
1 exp
1 2exp 2
D sd
sr rd sr rd
sr
OP
K

   

 
 
= − − 
 
 
 
 
 
 
− −   
 
 
 
 
(30)
4. NUMERICAL RESULTS AND DISCUSSION
In this section, we investigate the OP of the model system using Monte Carlo simulation in
connection with the primary system parameters [16-26]. In Figure 3, the effect of a2 on the system OP
is plotted with the primary system parameters as η=0.8, R1=R2=0.25, 0.5 bps/Hz, α=0.5. From the results,
we can see that the OP of the destination D1 significantly decreases with the rising of a2. However, the OP
of the D2 decreases when a2 increases from 0.55 to 0.7 and after that has a massive increase with
the remaining values of a2. In the same way, the system OP versus α is drawn in Figure 4. In this simulation,
we set η=0.8, R1=R2=0.5 bps/Hz, PS/N0=0.5, and a2=0.7, 0.9. As shown in Figure 4, we can state that the OP
of the model system has a slight decrease when α varies from 0 to 1. In both Figures 3 and 4, the simulation
and analyticalresults are the same with all values of α and a2.
Figure 3. OP versus a2 Figure 4. OP versus α
Bulletin of Electr Eng & Inf ISSN: 2302-9285 
Outage probability analysisof eh noma system network over rayleigh fading channel… (Phu Tran Tin)
263
Furthermore, we investigate the effect of η and ψ on the OP of the model system as plotted in
Figures 5 and 6. In these Figures, we set the primary parameters as a2=0.7, 0.9, R1=R2=0.5 bps/Hz,
PS/N0=0.5. From Figures 5 and 6, it can be observed that the system OP has a slight decrease when η varies
from 0 to 1 and the system OP crucially decreases with the rising of ψ from 0 to 25. In all two Figures,
the analytical and simulation results agree well with each other. On another hand, the comparison
of the system OP of two destination nodes is demonstrated in all Figures. From the results, we can state that
the system OP of the destination node D2 is better than the destination node D1.
Figure 5. OP versus η Figure 6. OP versus ψ
5. CONCLUSION
In this research, we propose EH NOMA network system over the Rayleigh fading channel using
selection combining at the receiver. The closed-form expression of the OP of the model system by Monte
Carlo simulation is derived. Moreover, the comparison of the OP of two destination users is investigated in
connection with the primary system parameters. From the results, we can see that all the analytical
and simulation results are the same with the primary system parameters using Monte Carlo simulation.
These results can be provided a novel recommendation for improving the performance of the EH NOMA
communication network system.
ACKNOWLEDGEMENTS
This research was supported by National Key Laboratory of Digital Control and System
Engineering (DCSELAB), HCMUT, VNU-HCM, Vietnam.
REFERENCES
[1] H. Chen, C. Zhai, Y. Li and B. Vucetic, "Cooperative strategies for wireless-powered communications: An
overview," in IEEE Wireless Communications, vol. 25, no. 4, pp. 112-119, August 2018.
[2] Yu, H., Lee, H., & H. Jeon, “What is 5G? Emerging 5G mobile services and network requirements,” in 5G Mobile
Services and Scenarios: Challenges and Solutions, vol. 9, pp. 1848, 2017.
[3] V. Sharma and P. Karmakar, "A novel method of opportunistic wireless energy harvesting in cognitive radio
networks," in 2015 7th International Conference on Computational Intelligence, Communication Systems and
Networks, Riga, 2015, pp. 59-64, 2015.
[4] F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta and P. Popovski, "Five disruptive technology directions for
5G," in IEEE Communications Magazine, vol. 52, no. 2, pp. 74-80, February 2014.
[5] L. Dai, B. Wang, Y. Yuan, S. Han, C. I and Z. Wang, "Non-orthogonal multiple access for 5G: solutions,
challenges, opportunities, and future research trends," in IEEE Communications Magazine, vol. 53, no. 9,
pp. 74-81, Sep 2015.
[6] Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li and K. Higuchi, "Non-Orthogonal Multiple Access
(NOMA) for cellular future radio access," in 2013 IEEE 77th Vehicular Technology Conference (VTC Spring),
Dresden, pp. 1-5, 2013.
[7] Z. Ding, P. Fan and H. V. Poor, "Impact of user pairing on 5G Nonorthogonal multiple-access downlink
transmissions," in IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6010-6023, Aug 2016.
 ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 1, February 2020 : 256 – 264
264
[8] S. Timotheou and I. Krikidis, "Fairness for Non-Orthogonal Multiple Access in 5G Systems," in IEEE Signal
Processing in Letters, vol. 22, no. 10, pp. 1647-1651, Oct. 2015.
[9] Al-Imari, Mohammed, Pei Xiao, Muhammad Ali Imran, and Rahim Tafazolli, "Uplink Non-orthogonal multiple
access for 5G wireless networks," in 2014 11th International Symposium on Wireless Communications Systems
(ISWCS), pp.781-785, 2014.
[10] J. Kim and I. Lee, "Non-Orthogonal multiple access in coordinated direct and relay transmission," in IEEE
Communications Letters, vol. 19, no. 11, pp. 2037-2040, Nov 2015.
[11] M. Xu, F. Ji, M. Wen and W. Duan, "Novel receiver design for the cooperative relaying system with
Non-Orthogonal multiple access," in IEEE Communications Letters, vol. 20, no. 8, pp. 1679-1682, Aug 2016.
[12] Kizilirmak, Refik Caglar, "Non-Orthogonal Multiple Access (NOMA) for 5G networks," in Towards 5G Wireless
Networks-A Physical Layer Perspective, 2016.
[13] Y. Liu, Z. Ding, M. Elkashlan and H. V. Poor, "Cooperative Non-orthogonal multiple access with simultaneous
wireless information and power transfer," in IEEE Journal on Selected Areas in Communications, vol. 34, no. 4, pp.
938-953, April 2016.
[14] Z. Ding, Z. Yang, P. Fan and H. V. Poor, "On the performance of Non-orthogonal multiple access in 5G systems
with randomly deployed users," in IEEE Signal Processing Letters, vol. 21, no. 12, pp. 1501-1505, Dec 2014.
[15] Daniel Zwillinger and Victor Moll. “Table of integrals, series, and products,” in Academic Press, 2014.
[16] Tan N. Nguyen, T. H. Q. Minh, Phuong T. Tran and Miroslav Voznak, “Adaptive energy harvesting relaying
protocol for two-way half duplex system network over Rician Fading channel,” in Wireless Communications
and Mobile Computing, 2018.
[17] T. Nguyen, T. Quang Minh, P. Tran, M. Vozňák, “Energy harvesting over Rician Fading channel:
A performance analysis for half-duplex bidirectional sensor networks under hardware impairments,”
in Sensors, vol. 18, pp. 1781, 2018.
[18] Tan N. Nguyen, T. H. Q. Minh, Phuong T. Tran, Miroslav Voznak, T. T. Duy, Thanh-Long Nguyen and Phu Tran
Tin, “Performance enhancement for energy harvesting based two-way relay protocols in wireless Ad-hoc networks
with partial and full relay selection methods,” in Ad hoc networks, vol 84, pp. 178-187, 2019.
[19] T. N. Nguyen, T. H. Q Minh, T.-L. Nguyen, D.-H. Ha, M. Voznak, “Performance analysis of user selection
protocol in cooperative networks with power splitting protocol based energy harvesting o Energy harvesting over
Rician Fading channel: A performance analysis for half-duplex Bidirectional Sensor Networks under Hardware
Impairments ver Nakagami-m/Rayleigh channel,” in Electronics, vol. 8, pp. 448, 2019.
[20] T. N. Nguyen, T. H. Q. Minh, T.-L. Nguyen, D.-H. Ha, M. Voznak, “Multi-Source power splitting energy
harvesting relaying network in half-duplex system over block Rayleigh Fading channel: System performance
analysis,” in Electronics, vol. 8, pp. 67, 2019.
[21] F. De Rango and M. Tropea, "Energy saving and load balancing in wireless ad hoc networks through ant-based
routing," in 2009 International Symposium on Performance Evaluation of Computer & Telecommunication
Systems, Istanbul, pp. 117-124, 2009.
[22] F. De Rango, & M. Tropea, “Swarm intelligence based energy saving and load balancing in wireless ad hoc
networks,” in In Proceedings of the 2009 workshop on Bio-inspired algorithms for distributed systems, ACM,
pp. 77-84, June 2009.
[23] M. Tropea and P. Fazio, "A new threshold switching scheme for a DVB-RCS+M return link in a terrestrian
scenario," in 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Montreal,
QC, pp. 1-4, 2012,
[24] M. Tropea, F. Veltri, F. De Rango, A. Santamaria and L. Belcastro, "Two step based QoS scheduler for DVB-S2
satellite system," in 2011 IEEE International Conference on Communications (ICC), Kyoto, pp. 1-5, 2011.
[25] Tin, Phu Tran, Le Anh Vu, Tan N. Nguyen, and Thanh-Long Nguyen, "User selection protocol in DF cooperative
networks with Hybrid TSR-PSR protocol based full-duplex energy harvesting over Rayleigh Fading channel:
System performance analysis," in Indonesian Journal of Electrical Engineering and Computer Science, vol. 3,
no. 2, pp. 534-542, 2019.
[26] Tin, Phu Tran, Minh Tran, Tan N. Nguyen, and Thanh-Long Nguyen, "System performance analysis of Hybrid
time-power switching protocol of EH bidirectional relaying network in amplify-and-forward mode," in Indonesian
Journal of Electrical Engineering and Computer Science, vol. 14, no. 1, pp. 123-131, 2019.

More Related Content

What's hot

Analyzing Business Models For Network Sharing Success
Analyzing Business Models For Network Sharing SuccessAnalyzing Business Models For Network Sharing Success
Analyzing Business Models For Network Sharing SuccessDr. Kim (Kyllesbech Larsen)
 
Basic LTE overview - LTE for indonesia
Basic LTE overview - LTE for indonesiaBasic LTE overview - LTE for indonesia
Basic LTE overview - LTE for indonesiaToenof Moegan
 
LTE Long Term Evolution
LTE Long Term EvolutionLTE Long Term Evolution
LTE Long Term Evolutionajus ady
 
Erbium Doped Fiber Amplifier (EDFA)
Erbium Doped Fiber Amplifier (EDFA)Erbium Doped Fiber Amplifier (EDFA)
Erbium Doped Fiber Amplifier (EDFA)Jayanshu Gundaniya
 
Network Planning and Optimization
Network Planning and OptimizationNetwork Planning and Optimization
Network Planning and Optimizationmathurrohitji
 
Satellite Link Budget_Course_Sofia_2017_Lisi
Satellite Link Budget_Course_Sofia_2017_LisiSatellite Link Budget_Course_Sofia_2017_Lisi
Satellite Link Budget_Course_Sofia_2017_LisiMarco Lisi
 
System(board level) noise figure analysis and optimization
System(board level) noise figure analysis and optimizationSystem(board level) noise figure analysis and optimization
System(board level) noise figure analysis and optimizationcriterion123
 
F01 beam forming_srs
F01 beam forming_srsF01 beam forming_srs
F01 beam forming_srsLuciano Motta
 
LTE introduction part1
LTE introduction part1LTE introduction part1
LTE introduction part1Pei-Che Chang
 
Carrier Aggregation Discussion
Carrier Aggregation DiscussionCarrier Aggregation Discussion
Carrier Aggregation Discussioncriterion123
 
3GPP SON Series: Inter-Cell Interference Coordination (ICIC)
3GPP SON Series: Inter-Cell Interference Coordination (ICIC)3GPP SON Series: Inter-Cell Interference Coordination (ICIC)
3GPP SON Series: Inter-Cell Interference Coordination (ICIC)3G4G
 
LTE Basic Principle
LTE Basic PrincipleLTE Basic Principle
LTE Basic PrincipleTaiz Telecom
 
Thulium doped fiber amplifiers
Thulium doped fiber amplifiersThulium doped fiber amplifiers
Thulium doped fiber amplifiersCKSunith1
 
802.11ac WIFI Fundamentals
802.11ac WIFI Fundamentals802.11ac WIFI Fundamentals
802.11ac WIFI Fundamentalscriterion123
 
EVM Degradation in LTE systems by RF Filtering
EVM Degradation in LTE systems by RF Filtering EVM Degradation in LTE systems by RF Filtering
EVM Degradation in LTE systems by RF Filtering criterion123
 
Introduction to differential signal -For RF and EMC engineer
Introduction to differential signal -For RF and EMC engineerIntroduction to differential signal -For RF and EMC engineer
Introduction to differential signal -For RF and EMC engineercriterion123
 

What's hot (20)

Analyzing Business Models For Network Sharing Success
Analyzing Business Models For Network Sharing SuccessAnalyzing Business Models For Network Sharing Success
Analyzing Business Models For Network Sharing Success
 
Basic LTE overview - LTE for indonesia
Basic LTE overview - LTE for indonesiaBasic LTE overview - LTE for indonesia
Basic LTE overview - LTE for indonesia
 
LTE Long Term Evolution
LTE Long Term EvolutionLTE Long Term Evolution
LTE Long Term Evolution
 
Erbium Doped Fiber Amplifier (EDFA)
Erbium Doped Fiber Amplifier (EDFA)Erbium Doped Fiber Amplifier (EDFA)
Erbium Doped Fiber Amplifier (EDFA)
 
Network Planning and Optimization
Network Planning and OptimizationNetwork Planning and Optimization
Network Planning and Optimization
 
Satellite Link Budget_Course_Sofia_2017_Lisi
Satellite Link Budget_Course_Sofia_2017_LisiSatellite Link Budget_Course_Sofia_2017_Lisi
Satellite Link Budget_Course_Sofia_2017_Lisi
 
Introductin sdh-pdh
Introductin sdh-pdhIntroductin sdh-pdh
Introductin sdh-pdh
 
System(board level) noise figure analysis and optimization
System(board level) noise figure analysis and optimizationSystem(board level) noise figure analysis and optimization
System(board level) noise figure analysis and optimization
 
What is 5G?
What is 5G?What is 5G?
What is 5G?
 
F01 beam forming_srs
F01 beam forming_srsF01 beam forming_srs
F01 beam forming_srs
 
LTE introduction part1
LTE introduction part1LTE introduction part1
LTE introduction part1
 
Carrier Aggregation Discussion
Carrier Aggregation DiscussionCarrier Aggregation Discussion
Carrier Aggregation Discussion
 
3GPP SON Series: Inter-Cell Interference Coordination (ICIC)
3GPP SON Series: Inter-Cell Interference Coordination (ICIC)3GPP SON Series: Inter-Cell Interference Coordination (ICIC)
3GPP SON Series: Inter-Cell Interference Coordination (ICIC)
 
LTE Basic Principle
LTE Basic PrincipleLTE Basic Principle
LTE Basic Principle
 
Thulium doped fiber amplifiers
Thulium doped fiber amplifiersThulium doped fiber amplifiers
Thulium doped fiber amplifiers
 
Optical amplifiers
Optical amplifiersOptical amplifiers
Optical amplifiers
 
802.11ac WIFI Fundamentals
802.11ac WIFI Fundamentals802.11ac WIFI Fundamentals
802.11ac WIFI Fundamentals
 
EVM Degradation in LTE systems by RF Filtering
EVM Degradation in LTE systems by RF Filtering EVM Degradation in LTE systems by RF Filtering
EVM Degradation in LTE systems by RF Filtering
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Introduction to differential signal -For RF and EMC engineer
Introduction to differential signal -For RF and EMC engineerIntroduction to differential signal -For RF and EMC engineer
Introduction to differential signal -For RF and EMC engineer
 

Similar to Outage probability analysis of EH NOMA system network over Rayleigh fading channel using selection combining at the receiver

Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...journalBEEI
 
Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...journalBEEI
 
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...TELKOMNIKA JOURNAL
 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...journalBEEI
 
Tractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATELKOMNIKA JOURNAL
 
Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...TELKOMNIKA JOURNAL
 
Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...journalBEEI
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMATELKOMNIKA JOURNAL
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkTELKOMNIKA JOURNAL
 
Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...IJECEIAES
 
Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisnooriasukmaningtyas
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...nooriasukmaningtyas
 
A new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systemsA new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systemsjournalBEEI
 
Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...TELKOMNIKA JOURNAL
 
Hybrid protocol for wireless EH network over weibull fading channel: performa...
Hybrid protocol for wireless EH network over weibull fading channel: performa...Hybrid protocol for wireless EH network over weibull fading channel: performa...
Hybrid protocol for wireless EH network over weibull fading channel: performa...IJECEIAES
 
Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...TELKOMNIKA JOURNAL
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
 
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...journalBEEI
 
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksComparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksTELKOMNIKA JOURNAL
 
Hybrid TSR-PSR in nonlinear EH half duplex network: system performance analy...
Hybrid TSR-PSR in nonlinear EH half duplex  network: system performance analy...Hybrid TSR-PSR in nonlinear EH half duplex  network: system performance analy...
Hybrid TSR-PSR in nonlinear EH half duplex network: system performance analy...IJECEIAES
 

Similar to Outage probability analysis of EH NOMA system network over Rayleigh fading channel using selection combining at the receiver (20)

Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...
 
Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...
 
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...
 
Tractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMA
 
Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...
 
Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA network
 
Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...
 
Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysis
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
 
A new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systemsA new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systems
 
Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...
 
Hybrid protocol for wireless EH network over weibull fading channel: performa...
Hybrid protocol for wireless EH network over weibull fading channel: performa...Hybrid protocol for wireless EH network over weibull fading channel: performa...
Hybrid protocol for wireless EH network over weibull fading channel: performa...
 
Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
 
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
 
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksComparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
 
Hybrid TSR-PSR in nonlinear EH half duplex network: system performance analy...
Hybrid TSR-PSR in nonlinear EH half duplex  network: system performance analy...Hybrid TSR-PSR in nonlinear EH half duplex  network: system performance analy...
Hybrid TSR-PSR in nonlinear EH half duplex network: system performance analy...
 

More from journalBEEI

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherjournalBEEI
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksjournalBEEI
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkjournalBEEI
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headjournalBEEI
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...journalBEEI
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)journalBEEI
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...journalBEEI
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...journalBEEI
 

More from journalBEEI (20)

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...
 

Recently uploaded

The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

Outage probability analysis of EH NOMA system network over Rayleigh fading channel using selection combining at the receiver

  • 1. Bulletin of Electrical Engineering and Informatics Vol. 9, No. 1, February 2020,pp. 256~264 ISSN: 2302-9285,DOI: 10.11591/eei.v9i1.1651  256 Journal homepage: http://beei.org Outage probability analysis of EH NOMA system network over Rayleigh fading channel using selection combining at the receiver Phu Tran Tin1, Minh Tran2, Tran Thanh Trang3 1 Faculty of Electronics Technology, Industrial University of Ho Chi Minh City, Vietnam 2 Optoelectronics Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Vietnam 3 National Key Laboratory of Digital Control and System Engineering, Vietnam Article Info ABSTRACT Article history: Received Jun 4, 2019 Revised Sep 26, 2019 Accepted Nov 10, 2019 Non-orthogonal multiple access (NOMA) with advantages such as superior spectral efficiency has been considered as a promising multiple access technique for the fifth-generation (5G) mobile networks. In this research, we propose energy harvesting (EH) NOMA system relaying network over Rayleigh fading channel using selection combining at the receiver. Firstly, we investigate the system performance in terms of the closed-form expression of the outage probability (OP). Here we compare the OP of two destination users of the proposed system. Finally, all the results is convinced by the Monte Carlo simulation. From the results, we can confirm that all the analytical and simulation results are the same in connection with the primary system parameters. Keywords: Energy harvesting (EH) Monte carlo Outage probability (OP) Power beacon Relaying network This is an open access article under the CC BY-SA license. Corresponding Author: Minh Tran, Optoelectronics Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City, Vietnam. Email: tranhoangquangminh@tdtu.edu.vn 1. INTRODUCTION Non-orthogonal multiple access (NOMA) with advantages such as superior spectral efficiency has been considered as a promising multiple access technique for the fifth-generation (5G) mobile networks [1-6]. In comparison with the traditional water-filling power allocation strategy, NOMA can transfermore power to the users in the worse channelconditions. It leads to a better trade-off between system throughput and user fairness. From the previous researches, authors investigated the impact of user pairing o n downlink NOMA systems as in [7], the authors in [8] have considered the power allocation with the max-min fairness criterion of the model system. An uplink NOMA scheme with joint power and subcarrier allocations hasbeen proposed and investigated in [9]. In [10], a cooperation-based NOMA scheme for coordinated direct and relay transmissions is studied. Furthermore, a diversity-oriented detection mechanism forthe cooperative relaying system using NOMA is considered by authors in [11]. The performance of transmit antenna selection for NOMA assisted multiple-input-multiple-output (MIMO) relay networks is presented in [12]. Then inspired by user collaboration,a cooperative NOMA transmission scheme is presented in [13]. In this research, we propose energy harvesting (EH) NOMA network system over the Rayleigh fading channel using selection combining at the receiver. In the first stage, we investigate and derive
  • 2. Bulletin of Electr Eng & Inf ISSN: 2302-9285  Outage probability analysisof eh noma system network over rayleigh fading channel… (Phu Tran Tin) 257 the closed-form expression of the outage probability (OP) of the model system by Monte Carlo simulation. Then the comparison of the OP of two destination users is investigated in connection with the primary system parameters. Finally, all the results are convinced by the Monte Carlo simulation. From the results, we can convince that all the analytical and simulation results are the same in connection with the primary system parameters.The main contributions of this research are listed as: - The EH NOMA network system over the Rayleigh fading channel using selection combining at the receiver is proposed. - The closed-form expression of the system OP is investigated and derived. - The comparison of the OP of two destination users is investigated. - All the results are convinced by the Monte Carlo simulation. 2. SYSTEM MODEL The EH NOMA network system over the Rayleigh fading channel using selection combining at the receiver is drawn in Figure 1. In this system model, we denote Source is S, Relay is R, D1 and D2 are two Destination nodes. We assume that all links between them (i.e., S-to-D1,2, S-to-R, and R-to-D1,2) are available. The Rayleigh fading channel coefficients of S-to-D1,2, S-to-R, and R-to-D1,2 links are denoted as hSD1,2, hSR, and hRD1,2, respectively as shown in Figure 1. The energy harvesting and information processing (IT) are illustrated in Figure 2. In this protocol, the transmission block time T, which consists of three-time slots. In the first-time slot αT (α is the time switching factor, 0<α<1), the relay harvests energy from the source node S. In the second interval time (1-α)T/2, the source S transfers the information to R and D1,2 at the same time. Finally, the relay node R transfers the information to the destination nodes D1,2 in the remaining time slot (1-α)T/2. EH IT S R D1 1 Rd h SR h D2 2 Sd h 1 Sd h 2 Rd h IT RàD1,D2 IT SàR, D1, D2 αT (1-α)T/2 T EH at R (1-α)T/2 Figure 1. System model Figure 2. The time switching protocol Energy harvesting phase In the first slot time αT, we formulate the received signal as: r sr s s r y h P x n = + (1) The received energy can be computed as: 2 r sr s E T h P  = (2) Where 0 1    is the energy conversion efficiency. The average transmit power at the R node can be calculated as: ( ) 2 1 / 2 s r sr s E P h P T   = = − (3) Where we denote 2 1    = − .
  • 3.  ISSN: 2302-9285 Bulletin of Electr Eng & Inf, Vol. 9, No. 1, February 2020 : 256 – 264 258 Information transmission In the second slot time, S transmits the superposed signal 1 1 2 2 s s a P x a P x + to relay, D1 and D2 according to the NOMA scheme [1]. a1, a2 are the power allocation coefficients for D1 and D2, where we assume 1 2 2 1 1, a a a a + =  , x1 and x2 are the transmit signal for D1 and D2, respectively. Hence, the received signal at the R node, D1 and D2 can be expressed as respectively [14]. ( ) 1 1 2 2 r sr s s r y h a P x a P x n = + + (4) ( ) 1 1 1 1 1 2 2 D sd s s d y h a P x a P x n = + + (5) ( ) 2 2 2 1 1 2 2 D sd s s d y h a P x a P x n = + + (6) Where 1 2 , d d n n are the additive white Gaussian noise (AWGN) at theD1 and D2 with zero-mean and variance N0, respectively. From (6), we separate the received signal at the D2 into two parts included signal and noise part for D2 to detect x1. 2 2 2 2 2 2 1 1 D sd s sd s d signal noise y h a P x h a P x n = + + (7) Hence, the received signal to interference and noise ratio (SINR) for D2 to detect x1 is given as:     2 2 2 2 2 2 2 2 2 2 2 2 2 1 0 1 1 sd s sd sd sd s sd signal h a P h a noise h a P N h a     = = =  + + (8) Where 0 s P N  = is the transmit signal to noise ratio (SNR). From (5), SIC is first used for D1 by detecting and decoding the information of D2. Hence, the received signal at the D1 can be rewritten as: 1 1 1 1 2 2 1 1 D sd s sd s d signal noise y h a P x h a P x n = + + (9) Then, the received SINR at D1 is given by: 1 21 1 2 2 2 1 1 sd sd sd h a h a    = + (10) After the far user message is decoded, D1 can decode its own information with the SINR asfollowing 1 1 2 1 sd sd h a   = (11) During the third slot time, the relaying node will amplify the received signal and forward to D1 and D2 with the amplifying factor 2 0 r r r s sr x P y P h N  = = + . The received signals at the D1 and D2 are expressed as,respectively.
  • 4. Bulletin of Electr Eng & Inf ISSN: 2302-9285  Outage probability analysisof eh noma system network over rayleigh fading channel… (Phu Tran Tin) 259 1 1 1 1 1 rd rd r rd rd r rd y h x n h y n  = + = + (12) Substituting (4) into (12) ( ) 1 1 1 1 1 2 2 rd rd sr s s r rd y h h a P x a P x n n    = + + +   (13) And ( ) 2 2 2 2 2 2 2 2 1 1 2 2 rd rd r rd rd r rd rd sr s s rd r rd y h x n h y n h h a P x a P x h n n    = + = + = + + + (14) Where 1 2 , rd rd n n was denoted the AWGN at D1 and D2, respectively. From (14), the received SINR for D2 to detect x2 is given as:     2 2 2 2 2 2 2 2 2 2 2 2 2 1 1/ sr rd rd sr rd rd signal h h a noise h h a h      = =  + + (15) Using the fact thatN0<<Pr,hence, (15) can be rewritten as: 2 2 2 2 2 2 2 2 2 2 2 2 2 2 1 2 2 2 2 2 2 1 1/ 1/ sr rd rd sr rd rd sr rd sr rd rd h h a h h a h h h a h h a h        = + +  + + (16) The received SINR when D1 first detect D2’s information is given by: 1 21 1 1 2 2 2 2 2 2 1 1/ sr rd rd sr rd rd h h a h h a h      + + (17) Applying SIC operation,the received SINR for D1 is given by: 1 1 1 2 2 1 2 1/ sr rd rd rd h h a h     + (18) 3. SYSTEM PERFORMANCE ANALYSIS The outage probability (OP) of the destination node D2 can be given by: ( ) ( ) ( ) 2 2 2 2 2 1 02 02 02 Pr max , Pr Pr D sd rd sd rd OP          =    =   (19) Where 2 2 02 2 1 R  = − with R2 being the target rate at the D2. From (8), we have:
  • 5.  ISSN: 2302-9285 Bulletin of Electr Eng & Inf, Vol. 9, No. 1, February 2020 : 256 – 264 260 ( )   ( )   2 2 2 2 2 2 2 02 02 2 1 2 2 02 1 02 02 2 02 1 2 02 1 2 02 1 Pr Pr 1 Pr 1 exp , 1, sd sd sd sd sd h a h a h a a if a a a a if a a                    =    +   = −     − −       = −       (20) Where 2 sd  is the mean of the random variable (RV) 2 2 sd h . From (16), we can calculate the second probability of (19) ( ) ( )   2 2 2 2 1 1 2 02 2 2 2 02 2 2 2 1 1 2 2 02 1 2 1 2 02 2 1 2 02 1 1 02 02 1 2 1 1 2 02 1 1 02 0 02 Pr Pr 1/ Pr 1/ Pr Pr 1 exp rd sr rd sr rd rd rd sr h h a h h a h a a a a f d f d a a                                                =  =   + +      =   + +     − −  =       +  =     − −   − −     1 1 1 2 02 1 1 02 exp( ) sr d a a              −     − −    (21) Where we denote 2 2 2 02 1 2 2 02 1 , , sr rd h h a a        = = = − , sr  and 2 rd  are the mean of RV 2 2 2 , sr rd h h , respectively. By changing a variable 02 1 2 02 1 1 02 1 02 ( ) x x a a           + = − −  = , (21) can be rewritten as: ( ) ( ) 2 2 02 02 02 02 0 exp Pr 1 exp exp sr sr rd rd sr x dx x               −  = −     − −          (22) Apply eq (3.324,1) of [15], (22) can be reformulated as: ( ) ( ) 2 2 2 02 1 Pr 1 2exp 2 rd sr sr rd sr rd K              = − −           (23) Where ( ) v K • is the modified Bessel function of the second kind and vth order. Substituting (20) and (23) into (19), finally, we can obtain: ( )   ( ) 2 2 2 2 1 1 1 exp 1 2exp 2 D sd sr rd sr rd sr OP K             = − −         − −             (24)
  • 6. Bulletin of Electr Eng & Inf ISSN: 2302-9285  Outage probability analysisof eh noma system network over rayleigh fading channel… (Phu Tran Tin) 261 Hence, the outage probability (OP) of the destination D1 can be given by: ( ) ( ) ( ) ( ) 1 21 1 21 1 21 1 21 1 1 02 01 02 01 02 01 02 01 1 2 Pr , Pr , 1 Pr , 1 Pr , D sd sd rd rd sd sd rd rd OP P P                 =        = −        −   =    (25) Where ( ) 21 1 1 02 01 1 Pr , sd sd P       = −     , ( ) 21 1 2 02 01 1 Pr , rd rd P       = −     . And 1 2 01 2 1 R  = − with R1 being the target rate at the D1 From (10) and (11), P1 can be calculated as: ( ) 1 1 1 1 1 1 1 1 2 2 2 1 02 1 01 2 1 2 2 02 01 2 02 1 1 2 02 01 2 02 1 1 2 1 Pr , 1 1 Pr , 1 Pr max , Pr 1 exp sd sd sd sd sd sd sd sd h a P h a h a h h a a a h a a a h                           = −       +         = −     −         = −      −         =   = − −      (26) Where 1 sd  is the mean of RV 1 2 sd h and 02 01 2 02 1 1 max , a a a          =   −   . From (17) and (18), P2 can be calculated as: ( ) ( ) 1 1 1 1 1 1 3 1 2 2 2 2 2 2 1 2 2 2 1 02 01 2 3 1 1 3 1 1 3 1 1 1 1 3 3 / 1/ 1 Pr , 1/ / 1 Pr , / Pr , / 1 Pr , 1 1 1 sr rd sr rd rd sr rd rd h h a h h a h P h h a h A A A B B B f d f d                                −       + +   = −          +     = −     −          −      = −      −   = − = −   ( ) ( ) ( ) 3 1 1 1 1 1 1 1 1 / / 1 exp exp rd sr sr F f d d                       −     −          = − − −   −       (27)
  • 7.  ISSN: 2302-9285 Bulletin of Electr Eng & Inf, Vol. 9, No. 1, February 2020 : 256 – 264 262 Where ( ) 1 2 2 1 3 02 01 2 02 1 1 , , , , max , sr rd h h A B A B a a a         = = = =  = − . And 1 , sr rd   are the mean of RV 2 sr h , 1 2 rd h , respectively changing variable 1 y  = −, (27) can be rewritten as: ( ) ( ) 1 1 2 0 0 1 exp exp 1 exp exp rd sr sr rd sr sr sr P y dy y y dy y               = − − − +            = − −  − −       (28) Apply equation (3.324,1)of [table of integral], (22) can be reformulated as: ( ) 1 1 2 1 1 2exp 2 sr rd sr rd sr P K              = − −        (29) where ( ) v K • is the modified Bessel function of the second kind and vth order. Substituting (26) and (29) into (25), finally, the outage probability of D1 can be claimed as: ( ) ( ) 1 1 1 1 1 1 1 exp 1 2exp 2 D sd sr rd sr rd sr OP K           = − −              − −            (30) 4. NUMERICAL RESULTS AND DISCUSSION In this section, we investigate the OP of the model system using Monte Carlo simulation in connection with the primary system parameters [16-26]. In Figure 3, the effect of a2 on the system OP is plotted with the primary system parameters as η=0.8, R1=R2=0.25, 0.5 bps/Hz, α=0.5. From the results, we can see that the OP of the destination D1 significantly decreases with the rising of a2. However, the OP of the D2 decreases when a2 increases from 0.55 to 0.7 and after that has a massive increase with the remaining values of a2. In the same way, the system OP versus α is drawn in Figure 4. In this simulation, we set η=0.8, R1=R2=0.5 bps/Hz, PS/N0=0.5, and a2=0.7, 0.9. As shown in Figure 4, we can state that the OP of the model system has a slight decrease when α varies from 0 to 1. In both Figures 3 and 4, the simulation and analyticalresults are the same with all values of α and a2. Figure 3. OP versus a2 Figure 4. OP versus α
  • 8. Bulletin of Electr Eng & Inf ISSN: 2302-9285  Outage probability analysisof eh noma system network over rayleigh fading channel… (Phu Tran Tin) 263 Furthermore, we investigate the effect of η and ψ on the OP of the model system as plotted in Figures 5 and 6. In these Figures, we set the primary parameters as a2=0.7, 0.9, R1=R2=0.5 bps/Hz, PS/N0=0.5. From Figures 5 and 6, it can be observed that the system OP has a slight decrease when η varies from 0 to 1 and the system OP crucially decreases with the rising of ψ from 0 to 25. In all two Figures, the analytical and simulation results agree well with each other. On another hand, the comparison of the system OP of two destination nodes is demonstrated in all Figures. From the results, we can state that the system OP of the destination node D2 is better than the destination node D1. Figure 5. OP versus η Figure 6. OP versus ψ 5. CONCLUSION In this research, we propose EH NOMA network system over the Rayleigh fading channel using selection combining at the receiver. The closed-form expression of the OP of the model system by Monte Carlo simulation is derived. Moreover, the comparison of the OP of two destination users is investigated in connection with the primary system parameters. From the results, we can see that all the analytical and simulation results are the same with the primary system parameters using Monte Carlo simulation. These results can be provided a novel recommendation for improving the performance of the EH NOMA communication network system. ACKNOWLEDGEMENTS This research was supported by National Key Laboratory of Digital Control and System Engineering (DCSELAB), HCMUT, VNU-HCM, Vietnam. REFERENCES [1] H. Chen, C. Zhai, Y. Li and B. Vucetic, "Cooperative strategies for wireless-powered communications: An overview," in IEEE Wireless Communications, vol. 25, no. 4, pp. 112-119, August 2018. [2] Yu, H., Lee, H., & H. Jeon, “What is 5G? Emerging 5G mobile services and network requirements,” in 5G Mobile Services and Scenarios: Challenges and Solutions, vol. 9, pp. 1848, 2017. [3] V. Sharma and P. Karmakar, "A novel method of opportunistic wireless energy harvesting in cognitive radio networks," in 2015 7th International Conference on Computational Intelligence, Communication Systems and Networks, Riga, 2015, pp. 59-64, 2015. [4] F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta and P. Popovski, "Five disruptive technology directions for 5G," in IEEE Communications Magazine, vol. 52, no. 2, pp. 74-80, February 2014. [5] L. Dai, B. Wang, Y. Yuan, S. Han, C. I and Z. Wang, "Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends," in IEEE Communications Magazine, vol. 53, no. 9, pp. 74-81, Sep 2015. [6] Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li and K. Higuchi, "Non-Orthogonal Multiple Access (NOMA) for cellular future radio access," in 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), Dresden, pp. 1-5, 2013. [7] Z. Ding, P. Fan and H. V. Poor, "Impact of user pairing on 5G Nonorthogonal multiple-access downlink transmissions," in IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6010-6023, Aug 2016.
  • 9.  ISSN: 2302-9285 Bulletin of Electr Eng & Inf, Vol. 9, No. 1, February 2020 : 256 – 264 264 [8] S. Timotheou and I. Krikidis, "Fairness for Non-Orthogonal Multiple Access in 5G Systems," in IEEE Signal Processing in Letters, vol. 22, no. 10, pp. 1647-1651, Oct. 2015. [9] Al-Imari, Mohammed, Pei Xiao, Muhammad Ali Imran, and Rahim Tafazolli, "Uplink Non-orthogonal multiple access for 5G wireless networks," in 2014 11th International Symposium on Wireless Communications Systems (ISWCS), pp.781-785, 2014. [10] J. Kim and I. Lee, "Non-Orthogonal multiple access in coordinated direct and relay transmission," in IEEE Communications Letters, vol. 19, no. 11, pp. 2037-2040, Nov 2015. [11] M. Xu, F. Ji, M. Wen and W. Duan, "Novel receiver design for the cooperative relaying system with Non-Orthogonal multiple access," in IEEE Communications Letters, vol. 20, no. 8, pp. 1679-1682, Aug 2016. [12] Kizilirmak, Refik Caglar, "Non-Orthogonal Multiple Access (NOMA) for 5G networks," in Towards 5G Wireless Networks-A Physical Layer Perspective, 2016. [13] Y. Liu, Z. Ding, M. Elkashlan and H. V. Poor, "Cooperative Non-orthogonal multiple access with simultaneous wireless information and power transfer," in IEEE Journal on Selected Areas in Communications, vol. 34, no. 4, pp. 938-953, April 2016. [14] Z. Ding, Z. Yang, P. Fan and H. V. Poor, "On the performance of Non-orthogonal multiple access in 5G systems with randomly deployed users," in IEEE Signal Processing Letters, vol. 21, no. 12, pp. 1501-1505, Dec 2014. [15] Daniel Zwillinger and Victor Moll. “Table of integrals, series, and products,” in Academic Press, 2014. [16] Tan N. Nguyen, T. H. Q. Minh, Phuong T. Tran and Miroslav Voznak, “Adaptive energy harvesting relaying protocol for two-way half duplex system network over Rician Fading channel,” in Wireless Communications and Mobile Computing, 2018. [17] T. Nguyen, T. Quang Minh, P. Tran, M. Vozňák, “Energy harvesting over Rician Fading channel: A performance analysis for half-duplex bidirectional sensor networks under hardware impairments,” in Sensors, vol. 18, pp. 1781, 2018. [18] Tan N. Nguyen, T. H. Q. Minh, Phuong T. Tran, Miroslav Voznak, T. T. Duy, Thanh-Long Nguyen and Phu Tran Tin, “Performance enhancement for energy harvesting based two-way relay protocols in wireless Ad-hoc networks with partial and full relay selection methods,” in Ad hoc networks, vol 84, pp. 178-187, 2019. [19] T. N. Nguyen, T. H. Q Minh, T.-L. Nguyen, D.-H. Ha, M. Voznak, “Performance analysis of user selection protocol in cooperative networks with power splitting protocol based energy harvesting o Energy harvesting over Rician Fading channel: A performance analysis for half-duplex Bidirectional Sensor Networks under Hardware Impairments ver Nakagami-m/Rayleigh channel,” in Electronics, vol. 8, pp. 448, 2019. [20] T. N. Nguyen, T. H. Q. Minh, T.-L. Nguyen, D.-H. Ha, M. Voznak, “Multi-Source power splitting energy harvesting relaying network in half-duplex system over block Rayleigh Fading channel: System performance analysis,” in Electronics, vol. 8, pp. 67, 2019. [21] F. De Rango and M. Tropea, "Energy saving and load balancing in wireless ad hoc networks through ant-based routing," in 2009 International Symposium on Performance Evaluation of Computer & Telecommunication Systems, Istanbul, pp. 117-124, 2009. [22] F. De Rango, & M. Tropea, “Swarm intelligence based energy saving and load balancing in wireless ad hoc networks,” in In Proceedings of the 2009 workshop on Bio-inspired algorithms for distributed systems, ACM, pp. 77-84, June 2009. [23] M. Tropea and P. Fazio, "A new threshold switching scheme for a DVB-RCS+M return link in a terrestrian scenario," in 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Montreal, QC, pp. 1-4, 2012, [24] M. Tropea, F. Veltri, F. De Rango, A. Santamaria and L. Belcastro, "Two step based QoS scheduler for DVB-S2 satellite system," in 2011 IEEE International Conference on Communications (ICC), Kyoto, pp. 1-5, 2011. [25] Tin, Phu Tran, Le Anh Vu, Tan N. Nguyen, and Thanh-Long Nguyen, "User selection protocol in DF cooperative networks with Hybrid TSR-PSR protocol based full-duplex energy harvesting over Rayleigh Fading channel: System performance analysis," in Indonesian Journal of Electrical Engineering and Computer Science, vol. 3, no. 2, pp. 534-542, 2019. [26] Tin, Phu Tran, Minh Tran, Tan N. Nguyen, and Thanh-Long Nguyen, "System performance analysis of Hybrid time-power switching protocol of EH bidirectional relaying network in amplify-and-forward mode," in Indonesian Journal of Electrical Engineering and Computer Science, vol. 14, no. 1, pp. 123-131, 2019.