SlideShare a Scribd company logo
1 of 12
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 2, April 2020, pp. 2139∼2150
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i2.pp2139-2150 Ì 2139
Efficient power allocation method for non orthogonal
multiple access 5G systems
Maan A. S. Al-Adwany
Department of Computer and Information Engineering, Ninevah University, Iraq
Article Info
Article history:
Received Apr 10, 2019
Revised Oct 19, 2019
Accepted Oct 27, 2019
Keywords:
IDMA
NOMA
Power allocation
ABSTRACT
One of the hot research topics for the upcoming 5G (fifth-generation) wireless
communication networks is the non orthogonal multiple access (NOMA) systems,
where it have attracted both industrial and academic fields to improve the existing
spectral efficiency. In fact, the multiuser detection process for NOMA systems is
largely affected by the power distribution of the received signals. In this paper, a new
method has been proposed to control the transmit power among active users in one of
the promising NOMA systems; the interleave division multiple access (IDMA) which
has been adopted here for consideration. Unlike conventional methods, where tedious
mathematical computations are required; a simple and direct method has been derived.
The proposed method has been applied to IDMA system with different FEC codes.
The obtained results show that the proposed method outperforms the conventional one
as compared to optimal results.
Copyright c 2020 Insitute of Advanced Engineeering and Science.
All rights reserved.
Corresponding Author:
Maan Ahmed Shehathah Al-Adwany,
Assistant Professor at Department of Computer and Information Engineering,
College of Electronics Engineering, Ninevah University, Mosul, Iraq.
Email: maanaladwany@yahoo.com
1. INTRODUCTION
Researchers have considered multiuser detection techniques for spread spectrum wireless communi-
cations systems and, recently, for non orthogonal multiple access (NOMA) systems. In fact, the multiuser
detection process is largely affected by the power of the received signals [1-3]. Thus, managing these powers is
crucial for interference suppression and the stability of the NOMA systems [4, 5]. In addition, one of the major
design concerns is the power consumption reduction for mobile devices. Thus, minimization of total power
received by uplink receiver is required while maintaining the SINR (signal to interference plus noise ratio) on
certain desired level at final iteration of multiuser detector. That is so called the ’power allocation problem’.
Recently, researchers spare no effort to solve the power allocation problem in NOMA system [1,2,6-9], while
early researches on power allocation problem were equally important that can be found elsewhere [10-15].
Although the methods that have been proposed in the literatureare have involved difficult
computations; they did not lead to exact solutions as one may expect. This, in turn, encouraged me to
derive a simple method to solve power allocation problem in IDMA as one of the promising NOMA systems
for 5G. The contribution of this paper can be summerized with the following points:
(a) This paper presents a method which could be an efficient alternative to the existing power allocation
methods for IDMA system.
(b) The proposed method draws its strength from being simple and direct. It depends only on the forward
error correcting (FEC) rate to solve power allocation problem in IDMA system; whereas other methods
usually use linear programing or complex analytical approaches.
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
2140 Ì ISSN: 2088-8708
This paper is organized as follows: after the introduction, the IDMA uplink system is briefly described
in section 2 in order for a reader to focus only on the power allocation problem which is presented in section 3.
Whereas a modelling of the proposed method is considered in section 4. Numerical results are then discussed
in section 5. Finally, the conclusions are drawn in section 6.
2. IDMA UPLINK SYSTEM
Interleave Division Multiple Access (IDMA) is a promising non orthogonal multiple access
system [16-19], so it has been adopted for consideration in this research. It can be considered as a special
case of spread spectrum systems. In IDMA system the users are identified by their unique interleavers [20-27],
while in spread spectrum systems such as CDMA the users are identified by their unique codes. The mechanism
of the IDMA uplink system can be clarified according to the schematic diagram shown in Figure 1.
Multiple
Access
Channel
FEC encoder
Convolutional Encoder Repetition Code Interleaver 1
h1
User1
FEC encoder
Convolutional Encoder Repetition Code Interleaver 2
h2
User2
FEC encoder
Convolutional Encoder Repetition Code Interleaver K
hK
UserK
Elementary
Signal
Estimator
(ESE)
Decoder
De-interleaver 2
User2
Interleaver 2
Decoder
De-interleaver K
UserK
Interleaver K
Decoder
De-interleaver 1
User1
Interleaver 1
Figure 1. The structure of the IDMA system
At the transmit side, the information bits of each user are encoded using certain FEC (forward-error-
correction) codes that are assumed the same for all users. Each FEC code is achieved by serial concatena-
tion of convolutional code of rate Rc along with a repetition code of rate Rp resulting a total FEC code rate
of Rt=RcRp. Consequently, the system can be considered to have a total spreading factor SF = 1/Rt.
Figure 2. illustrates some well-known FEC codes that have been used in this paper. After that, the encoded
bits (also called chips) are organized into frames each has length of 1024; to be prepared for the interleaving
process where each user is assigned a unique interleaver. In IDMA, the key principle is that the user specific in-
terleavers should have minimum cross correlation and must be generated randomly and independently. In fact,
these user specific interleavers make a dispersion in the encoded sequences which produces an approximately
uncorrelated adjacent chips; this in turn facilitates the receiver detection process. The interleavers at receiver
and transmitter sides should be stored somewhere at the base station by utilizing a memory prepared for this
purpose. Throughout the duration of the initial link setting-up stage, the base station and the mobile stations
must exchange messages to tell each other about the employed interleavers. In this paper, in order to focus on
the power allocation problem, it is assumed that the employed interleavers are optimum.
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2139 – 2150
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2141
Convolutional Code
Repetition
Code Rate
(Rp)
Total Code
Rate
(Rt=Rc Rp)
Total
Spreading
Factor
SF=1/Rt
kmaxCode
generator
(octal)
Constraint
length
Feedback
Code Rate
(Rc)
FEC1 (237 345)8 8 (237)8 1/2 1/8 1/16 16 12
FEC2 (27 31)8 5 (27)8 1/2 1/8 1/16 16 13
FEC3 (5 3)8 3 (5)8 1/2 1/8 1/16 16 18
FEC4 (23 35)8 5 (23)8 1/2 1/4 1/8 8 7
Figure 2. Some FEC codes that were used in this research
The interleaver output is then scaled by coefficient for each user hk; which is assumed to constitute
the combined effect of the channel loss and power control factor. In other words, the distribution of h2
k can be
fitted via power control process. The signals of all active users are assumed to be superimposed into a wireless
flat fading channel. At the receive side, the receiver is composed of elementary signal estimator (ESE) along
with a bank of K decoders (DECs) corresponding to K users. The DECs are a posteriori probability (APP)
decoders. A related point to consider, is that the operation of the receiver is mainly based on multiple access
channel and the FEC code constraints. The outcomes of the ESE and DECs are combined, via an iterative
process, to retrieve the transmitted bits. It is suitable here to mention that we have designed and achieved the
IDMA uplink system simulator using MATLAB, but it has not been included in this paper to avoid redundancy.
3. PROBLEM FORMULATION
As mentioned before, the performance of IDMA system can be enhanced through suitable power
allocation. The proper power distribution among users will highly increase the chance for correct signal
detection at the receiver. Strong signals are firstly detected. Consequently, their interference effect on weak
signals can be correctly removed which in turn increase the chance of weak signal detection.
The main research question here is: how to allocate the power levels among users?. In general,
the power allocation problem can be solved by dividing the total number of multiple access users into groups,
where for each a certain power level is assigned. As a consequence, the former research question triggers the
following three sub-questions:
(a) What is the proper size for each group?
(b) What is the proper power level for each group to achieve feasible target BER?
(c) If 1 and 2 are satisfied, has the total transmitted power (Pt) from all active users been minimized
as a result?
Early researches tried to solve this issue; for instance Schlegel et al. [28] proved that the minimum
total power can be achieved when the groups have an equal number of users; so one can adopt this assumption
as a foundation to meet other sub-questions. Therefore, the objective of this research becomes how to find the
proper power level for each group so that the minimum total power condition is satisfied with feasible BER
(typically 10−6
).
4. MODELLING OF PROPOSED METHOD
Unlike the existing researches, this paper have revealed a new feature for FEC codes which can be
utilized to solve the power allocation problem. The feature tells us that all FEC codes can support limitted
number of users (users with same power level). However, exceeding this limit leads to degradation in system
performance. Figure 3 shows the simulation results of the BER with number of equal power users for dif-
ferent FEC codes. One can observe that for each FEC code, a target BER of 10−6
can be achieved as long
as the number of users do not exceed certain threshold say kmax. Above this threshold, the BER jumps to
infeasible values.
In this work, such a feature has been exploited to solve the power allocation problem. It is obvious,
from the former figure, that kmax for the codes FEC1, FEC2, and FEC3, are 12, 13, and 18, respectively.
Efficient power allocation method for non orthogonal... (Maan A. S. Al-Adwany)
2142 Ì ISSN: 2088-8708
Figure 2 demonstrates some FEC codes with their corresponding kmaxs. To clarify our proposed method,
it is suitable to discuss the following example. Assume an IDMA (NOMA) system with BPSK mapping of
SNR = 10dB and with the following specifications: the total number of users (K) is 32; a FEC code consisting
of convolutional code of rate 1/2 serially concatenated with a repetition code of length 8 (i.e Rp = 1/8).
Thus the total FEC rate is Rt = 1/16 .
In order to distribute the power among active users; first, one should divide the total number of users
K into groups. We start with the case of 32 groups, each group consists of one user. Now, assume that
the power set {p∗
1 p∗
2 ... p∗
32} represents a solution to the power allocation problem. The power set should
satisfy two conditions: a minimum total power; and convergence to feasible BER. By assuming that the up-
link users have the same transmission rate, one can prove that the power set should follow a constant ratio
according to [29]; hence:
p∗
2/p∗
1 = p∗
3/p∗
2.... = p∗
K/p∗
K−1 = Ψ
where Ψ represents power ratio. Assume p∗
1 represents the minimum transmit power allowed for each user
(pmin), hence the power set can be rewritten as:
{pmin βpmin β2
pmin .....β31
pmin}
or
pmin{1 β β2
.....β31
}
The power ratio (Ψ) in this case is equal to β. It is worth mentioning that pmin can be determined
according to the wireless system requirements. Thus, solution of the power allocation problem is mainly
achieved by finding β . Since total power should be minimized, hence the power allocation problem can be
solved by finding the minimum β (i.e. βmin ), or for the sake of generality Ψmin.
0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32
10
−10
10
−8
10
−6
10
−4
10
−2
10
0
N
BER
FEC1
FEC2
FEC3
kmax1 kmax3
kmax2
SF=16
Figure 3. BER vs. number of equal power users
4.1. Finding minimum power ratio (βmin)
Going forward to find βmin, assume that g represents the number of users per group (or the group
size). Thus, for the same total number of users K = 32, in order to increase the group size from 1 to 2 one
should raise the power ratio Ψ from β to β2
as shown in Figure 4; starting from rightmost column . This is
logically acceptable if one thinks of it as to ensure that each group will have enough power for converging to
the target BER. By the same way, in order to increase g to 4, the power ratio Ψ should be increased to β4
, and
so on. Figure 4 shows the possible group sizes along with the corresponding power ratios. In general, one can
observe that for certain group size (g); the corresponding power ratio should be βg
. Figure 5 illustrates the
effect of group size on the power ratio. It is obvious that as the group size increases, the required power ratio
also increases. While for certain FEC code, as the group size approaches kmax, the required power ratio fairly
increases. Thus, in order to avoid unwanted increase in total power, we recommend that the maximum group
size should not approach kmax for given FEC code.
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2139 – 2150
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2143
Total number of users=32
2 groups 4 groups 8 groups 16 groups 32 groups
g=16 users/group g=8 users/group g=4 users/group g=2 users/group g=1 users/group
Power Ratio(Ψ)=β16
Power Ratio(Ψ)=β8
Power Ratio(Ψ)=β4
Power Ratio(Ψ)=β2
Power Ratio(Ψ)=β
β0
β0
β0
β0 β0
β1
β2 β2
β3
β4
β4 β4
β5
β6 β6
β7
β8
β8
β8 β8
β9
β10 β10
β11
β12
β12 β12
β13
β14 β14
β15
β16
β16
β16
β16 β16
β17
β18 β18
β19
β20
β20 β20
β21
β22 β22
β23
β24
β24
β24 β24
β25
β26 β26
β27
β28
β28 β28
β29
β30 β30
β31
Pt5 = g Pmin (β0
+ β16
)
Pt4 = g Pmin (β0
+
β8
+β16
+β24
)
Pt3 = g Pmin (β0
+
β4
+β8
+....+β28
)
Pt2 = g Pmin (β0
+
β2
+β4
+....+β30
)
Pt1 = g Pmin (β0
+
β1
+β2
+....+β31
)
Figure 4. Estimated power ratios for different group sizes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
0
5
10
15
20
25
30
Number of users per group (g)
PowerRatio(Ψ)
FEC1
FEC3
kmax1
kmax3
Figure 5. Power ratio vs. group size for different FEC codes
Efficient power allocation method for non orthogonal... (Maan A. S. Al-Adwany)
2144 Ì ISSN: 2088-8708
The important note here is that for certain FEC code (say FEC3), the sum of the users’ normalized
powers should not exceed kmax as seen by the receiver; otherwise the BER jumps to infeasible values as shown
in Figure 3. So;
PT otal
Pmax
≤ kmax (1)
Now, assume that the number of groups is decreased from 32 down to 2. Thus, each of the resulting
two groups would have the maximum number of users gmax (where gmax = 16 in our example). Hence, one
can derive;
(gmaxPmin + gmaxPmax)
Pmax
≤ kmax (2)
where in this case Pmax = βgmax
Pmin, thus;
gmax
βgmax
+ gmax ≤ kmax (3)
which leads to;
β ≥ (
gmax
kmax − gmax
)
1
gmax (4)
Since total power should be minimized, which means minimum power ratio among groups, hence
one can write;
βmin = (
gmax
kmax − gmax
)
1
gmax (5)
where gmax < kmax. Knowing that gmaxand kmax are integers, and gmax should have maximum value; thus
gmax = kmax − 1. Substituting for gmax;
βmin = (kmax − 1)( 1
kmax−1 )
(6)
It is obvious that one can find a solution for power allocation problem for any FEC code by knowing
its kmax, which is the objective of this research. However, by knowing that every FEC code has its own
kmax, which may be somewhat difficult to find; hence it is preferable if one can make further simplification to
equation (6).
4.2. Simplification of equation (6)
In order to understand (6), it is preferable to study its characteristics. Figure 6 shows the variation
of the minimum power ratio βmin versus range of kmax integer values. One can observe that for kmax > 4
(which is the case in practical FEC codes), increasing kmax always results in decreasing the power ratio βmin
. This will in turn reduce the total power. Although larger values of βmin ensure iterative receiver convergence
to the target BER with fewer iterations, but it will be at the expense of unwanted increase in total power. Thus,
a reasonable trade-off should be achieved.
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2139 – 2150
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2145
0 4 8 12 16 20 24 28 32 36 40 44 48
1
1.05
1.1
1.15
1.2
1.25
1.3
1.35
1.4
1.45
kmax
MinimumPowerRatio(βmin)
power
ratio=β∗
min
kmax = SF
Figure 6. βmin vs. kmax
In order to make a proper trade-off, Figure 3 should be studied carefully. By looking from the line
N = 16 = SF, one can note that strong FEC codes such as FEC1 and FEC2 have kmax < SF. Whereas weak
FEC codes (such as FEC3) have kmax > SF. Thus, it may be suitable to consider SF as the average value for
kmax for a range of FEC codes; from the strongest one to weakest.
According to the previous discussion, an acceptable trade-off can be achieved by replacing kmax
in (6) by SF. This replacement leads to simplify (6) to;
β∗
min ≈ (SF − 1)( 1
SF −1 )
(7)
Thus, in order to find the power ratio β∗
min we only need to know the total spreading factor ( SF =
1/RcRp) rather than knowing kmax for each code. So, generally speaking, to find the minimum power ratio
Ψmin for certain group size (g), the rule can be rewritten in the following final general form;
Ψmin|g = (β∗
min)g
≈ (SF − 1)( g
SF −1 )
(8)
It is worth mentioning that the rule in equation (8) is derived under assumption that the users who
undergo the power control process should utilize the same total FEC rate.
4.3. Proposed power allocation algorithm
Figure 7 shows the proposed power allocation algorithm. It starts by entering total number of users,
total FEC rate, and the minimum transmit power allowed for each user. Then an initial value for group size (g)
is assumed to be 1. After that, the algorithm runs to find the group size that satisfies the minimum total power;
then allocates the power among users accordingly.
5. RESULTS AND DISCUSSION
To verify the ability of our proposed method to solve the power allocation problem, the method has
been applied to different FEC codes. For the sake of simplicity, FEC3 is discussed. Figure 8 shows two methods
of finding the power ratio; our proposed method (green color) and one of the conventional methods for NOMA
(brown color) [1,2,4,6-10,28] compared to the corresponding optimum method (blue color). Compared with
the optimal results, the proposed method seems in good agreement. However, saying ”in good agreement” can
not be considered as a measure. So, one should put a measure to describe the degree of agreement precisely.
Thus, in this paper a term coincidence (C) has been used to represent this measure of agreement; more generally
the percentage coincidence which can be expressed as C = (1 − ) × 100% , where;
=
Ψestimated − Ψoptimum
Ψoptimum
(9)
C = 1 −
Ψestimated − Ψoptimum
Ψoptimum
× 100% (10)
Efficient power allocation method for non orthogonal... (Maan A. S. Al-Adwany)
2146 Ì ISSN: 2088-8708
Start
Set Counter
𝑖𝑖 = 1.
Distribute Users into Groups:
Group Size 𝑔𝑔 = 2(𝑖𝑖−1)
.
Calculate the Minimum Power
Ratio:
𝛽𝛽𝑚𝑚𝑚𝑚𝑚𝑚 = (𝑆𝑆𝑆𝑆 − 1)�
1
𝑆𝑆𝑆𝑆 −1
�
.
Calculate the Power Ratio (𝛹𝛹) According
to the Group Size:
𝛹𝛹𝑚𝑚𝑚𝑚𝑚𝑚 (𝑔𝑔) = 𝛽𝛽𝑚𝑚𝑚𝑚𝑚𝑚
𝑔𝑔
.
𝑃𝑃𝑡𝑡 = 𝑔𝑔 × 𝑃𝑃 𝑚𝑚𝑚𝑚𝑚𝑚 ∗ � 𝛽𝛽𝑚𝑚𝑚𝑚𝑚𝑚
(𝑛𝑛−1)×𝑔𝑔
�
𝐾𝐾
𝑔𝑔
�
𝑛𝑛=1
Calculate Total Power:
is Pt
minimum
?
𝐾𝐾
2𝑔𝑔
> 2
?
𝑖𝑖 = 𝑖𝑖 + 1
Follow the Steps to Allocate
the Power Among Users:
1-Distribute Users into
𝐾𝐾
𝑔𝑔
Groups.
2-Follow Table 2 for
Suitable Power Allocation.
YES
NO
YES
NO
Enter
K: Total Number of Users.
Total FEC Rate: 𝑅𝑅𝑡𝑡 = 𝑅𝑅𝑐𝑐 × 𝑅𝑅𝑝𝑝.
Pmin: Minimum Transmit Power Allowed
For User.
Calculate the Spreading Factor:
𝑆𝑆𝑆𝑆 =
1
𝑅𝑅𝑡𝑡
.
Figure 7. Proposed power allocation algorithm
2 4 6 8 10 12 14 16
0
2
4
6
8
10
12
14
16
18
Number of users per group (g)
PowerRatio(Ψ)
Ψ calculated
using NOMA
proposed method
Ψ calculated using
NOMA conventional
methods
Ψ Optimum
Figure 8. Comparison among different methods of finding the power ratio for FEC3
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2139 – 2150
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2147
Figure 9 illustrates the degree of coincidence of the proposed method as compared to the conventional
one. It is clear that for the conventional method, the coincidence (C) is excellent for g = 4 or fewer; whereas
it drops down for g larger than 4. However, our proposed method shows better performance especially for g
larger than 4. Accordingly, one may decide to distribute users into small groups (low values of g ) for the sake
of maximum coincidence. However, in the power allocation problem some other parameters must be taken
into account. One of these, is the total power consumed by active users (Pt). It is known that the purpose
behind the power allocation is to distribute power among users to facilitate the multi-user detection process,
with minimum total power consumption. Thus, one should choose minimum Pt. Figure 10 illustrates that our
proposed method can achieve a minimum total power of 25dB at g = 16, whereas the conventional method
achieves 27dB at g = 1.
2 4 6 8 10 12 14 16
0
10
20
30
40
50
60
70
80
90
100
Number of users per group (g)
Coincidence%
NOMA Conventional Method
NOMA Proposed Method
Figure 9. Percentage coincidence vs. g for FEC3
2 4 6 8 10 12 14 16
20
25
30
35
40
45
50
55
Number of users per group (g)
RelativeTotalPower[dB]
NOMA Conventional Method
NOMA Proposed Method
Figure 10. Relative total power vs. g for FEC3
It is clear that our proposed method reduces the total power by 2dB at g = 16. According to
Figure 8, g = 16 corresponds to significant increase in the power ratio (green color) as compared to the
optimum one. Fortunately, this increase will facilitate the detection process by reducing the number of itera-
tions needed to reach the target BER as shown in Figure 11.
1 5 10 15
10
15
20
25
30
35
40
45
50
55
60
Number of users per group (g)
NumberofIterations
NOMA Optimal Method
NOMA Proposed Method
Figure 11. Receiver iterations vs. group size. A comparison between the proposed method and the simulation
results for FEC3
It is important here to mention that the ‘optimum method’ denotes to the method that achieves
the minimum total power regardless the number of receiver iterations required to reach target BER.
Now, referring to Figure 11, our proposed method shows considerable reduction in the number of iterations
over the possible values of g. This can be interpreted as follows: from the iterative receiver point of view,
the increase in the power ratio Ψ increases the receiver ability to discriminate among users groups. This in turn
Efficient power allocation method for non orthogonal... (Maan A. S. Al-Adwany)
2148 Ì ISSN: 2088-8708
enhances the receiver ability to converge to the target BER ( 10−6
) with fewer number of iterations. In other
words, it means reducing the time for receiver to achieve its assigned task. Figure 12 illustrates the percentage
reduction in the time required by the receiver to converge to the target BER which is called here ’Task Time
Reduction’. It is clear that choosing g = 16 can reduce task time by 47%.
Moreover, to further verify the validity of our proposed method; we have applied it to different
FEC codes. Figure 13 and Figure 14 show the relative total power graphs for FEC2 and FEC1, respectively.
It is clear that our proposed method outperforms the conventional one by increasing the FEC code constraint
length. In other words, the proposed method performs better as the FEC code becomming stronger.
1 5 10 15
45
50
55
60
65
70
75
80
85
90
95
Number of users per group (g)
TaskTimeReduction%
Figure 12. The percentage Task Time reduction
vs. g for FEC3
2 4 6 8 10 12
20
25
30
35
40
45
50
55
Number of users per group (g)
RelativeTotalPower[dB]
NOMA Conventional Method
NOMA Proposed Method
Figure 13. Relative total power vs. g for FEC2
1 2 3 4 5 6 7 8 9 10
20
25
30
35
40
45
50
55
60
Number of users per group (g)
RelativeTotalPower[dB]
NOMA Conventional Method
NOMA Proposed Method
Figure 14. Relative total power vs. g for FEC1
6. CONCLUSIONS
In this paper, a new method has been derived to simplify the solution of the power allocation problem
in one of the promising NOMA systems; that is the IDMA system. Compared with the conventional methods,
the proposed method is proved to be efficient and easy to apply because it needs only total system FEC rate to
find a solution to the power allocation problem. Finally, the obtained numerical results show that this simple
method is more feasible than its counterparts and could be applied right away.
REFERENCES
[1] J. Zhu, et al., ”On optimal power allocation for downlink non-orthogonal multiple access systems,” IEEE
Journal on Sel. Areas in Comm., vol. 35, no. 12, pp. 2744–2757, 2017.
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2139 – 2150
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2149
[2] M. S. Ali, et al., ”Downlink power allocation for CoMP-NOMA in multi-cell networks,” IEEE Trans. on
Comm., vol. 66, no. 9, pp. 3982–3998, 2018.
[3] Z. Ding, P. Fan, and H. V. Poor, ”Impact of user pairing on 5g nonorthogonal multiple-access downlink
transmissions,” IEEE Trans. on Vehicular Tech., vol. 65, no. 8, pp. 6010–6023, 2016.
[4] E. R. Rezagah, T. Yoshioka, and N. Suzuki, ”Power allocation for uplink non-orthogonal multiple access
in 5G,” 2017 International Conf. on Wireless Comm., Signal Proc. and Networking (WiSPNET), pp.
16–20, 2017.
[5] K. Senel and S. Tekinay, ”Optimal power allocation in noma systems with imperfect channel estimation,”
2017 IEEE Global Comm. Conf. (GLOBECOM 2017), pp. 1–7, 2017.
[6] F. Fang, J. Cheng, and Z. Ding, ”Joint energy efficient subchannel and power optimization for a downlink
NOMA heterogeneous network,” IEEE Trans. on Vehicular Tech., vol. 68, no. 2, pp. 1351–1364, 2019.
[7] W. U. Khan, et al., ”Efficient power allocation in downlink multi-cell multi-user NOMA networks,” IET
Comm., vol. 13, no. 4, pp. 396–402, 2019.
[8] X. Chen, et al., ”Optimal power allocations for non-orthogonal multiple access over 5G full/half-duplex
relaying mobile wireless networks,” IEEE Trans. on Wireless Comm., vol. 18, no. 1, pp. 77–92, 2019.
[9] S. Ma, et al., ”Optimal power allocation for mobile users in non-orthogonal multiple access visible light
communication networks,” IEEE Trans. on Comm., vol. 67, no. 3, pp. 2233–2244, 2019.
[10] L. Ping and L. Liu, ”Analysis and design of IDMA systems based on snr evolution and power allocation,”
IEEE 60th Vehicular Tech. Conf. VTC2004-Fall, vol. 2, pp. 1068–1072, 2004.
[11] L. Ping, ”Interleave division multiple-access,” IEEE Trans. on Wireless Comm., vol. 5, no. 4, pp. 938–947,
2006.
[12] Z. Rosberg, ”Optimal transmitter power control in interleave division multiple access (IDMA) spread
spectrum uplink channels,” IEEE Trans. on Wireless Comm., vol. 6, no. 1, pp. 192–201, 2007.
[13] P. Weitkemper and K. D. Kammeyer, ”Power optimization of IDMA systems with different target BER
constraints,” 2007 IEEE 65th Vehicular Tech. Conf. VTC2007-Spring, pp. 2812–2816, 2007.
[14] M. S. K. Lau, W. Yue, and P. Wang, ”On a power allocation method for IDMA systems,” IEEE Trans. on
Wireless Comm., vol. 7, no. 8, pp. 2905–2910, 2008.
[15] P. Wang, J. Xiao, and L. Ping, ”Comparison of orthogonal and nonorthogonal approaches to future wire-
less cellular systems,” IEEE Veh. Tech. Mag., vol. 1, no. 3, pp. 4–11, 2006.
[16] Y. Chen, ”Exploiting gaussian approximation for non-orthogonal coded access,” 2018 IEEE 87th Vehicu-
lar Tech. Conf. (VTC Spring), pp. 1–5, 2018.
[17] R. Keating, R. Ratasuk, and A. Ghosh, ”Investigation of non-orthogonal multiple access techniques for
future cellular networks,” 2017 IEEE 86th Vehicular Tech. Conf. (VTC-Fall), pp. 1–5, 2017.
[18] P. Marsch, et al., ”5G radio access network architecture: Design guidelines and key considerations,” IEEE
Comm. Mag., vol. 54, no. 11, pp. 24–36, 2016.
[19] L. Dai, et al., ”Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future
research trends,” IEEE Comm. Mag., vol. 53, no. 9, pp. 74–81, 2015.
[20] I. M. Mahafeno, C. Langlais, and C. Jego, ”OFDM-IDMA versus IDMA with ISI cancellation for qua-
sistatic rayleigh fading multipath channels,” 4th Int. Symp. Turbo Codes and Related Topics; 6th Interna-
tional ITG-Conf. on Source and Channel Coding, pp. 1–6, 2006.
[21] K. Kusume, G. Bauch, and W. Utschick, ”IDMA vs.CDMA: Analysis and comparison of two multiple
access schemes,” IEEE Trans. on Wireless Comm., vol. 11, no. 1, pp. 78-87, 2012.
[22] P. Hammarberg, F. Rusek, and O. Edfors, ”Channel estimation algorithms for OFDM-IDMA: Complexity
and performance,” IEEE Trans. on Wireless Comm., vol. 11, no. 5, pp. 1722–1732, 2012.
[23] C. Novak, G. Matz, and F. Hlawatsch, ”IDMA for the multiuser MIMO-OFDM uplink: A factor graph
framework for joint data detection and channel estimation,” IEEE Trans. on Signal Proc., vol. 61, no. 16,
pp. 4051–4066, 2013.
[24] K. Wu, K. Anwar, and T. Matsumoto, ”BICM-ID-based IDMA using extended mapping,” IEICE Trans.
on Comm., vol. E97-B, no. 7, pp. 1483–1492, 2014.
[25] L. Liu, et al., ”Quantize-and-forward strategy for interleave-division multiple-access relay channel,” IEEE
Trans. Veh. Tech., vol. 65, no. 3, pp. 1808–1814, 2016.
[26] L. Bing, et al., ”Design and performance analysis of multiuser CPM with single user detection complex-
ity,” IEEE Trans. on Wireless Comm., vol. 15, no. 6, pp. 4032–4044, 2016.
[27] G. Song and J. Cheng, ”Distance enumerator analysis for interleave division multi-user codes,” IEEE
Efficient power allocation method for non orthogonal... (Maan A. S. Al-Adwany)
2150 Ì ISSN: 2088-8708
Trans. on Info. Theory, vol. 62, no. 7, pp. 4039–4053, 2016.
[28] C. Shlegel, Z. Zhenning, and M. Burnashev, ”Optimal power/rate allocation and code selection for it-
erative joint detection of coded random CDMA,” IEEE Trans. on Info. Theory, vol. 52, no. 9, pp.
4286–4294,2006.
[29] P. A. Hoeher and H. Schoeneich, ”Interleave-division multiple access from a multiuser theory point of
view,” 4th Int. Symp. on Turbo Codes and Related Topics; 6th International ITG-Conf. on Source and
Channel Coding, pp. 1–5, 2006.
BIOGRAPHY OF AUTHOR
Maan Ahmed Shehathah Al-Adwany born in Mosul/Iraq in August 1974. In 1997 he received his
BSc degree from College of Engineering, University of Mosul, Electrical Engineering (Electronics
and Communications), also he received his MSc degree in Electronics and Communications Engi-
neering from the same institution in year 2000. He worked as assistant lecturer at Mosul University
since 2001, and then is promoted to a lecturer degree in 2007 and to assistant professor degree in
2013. He published more than 20 papers in international journals and conferences. Furthermore,
he was working as consulting member for the Engineering Consulting Bureau of the University of
Mosul in many engineering industrial projects.
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2139 – 2150

More Related Content

What's hot

Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
 
Energy Splitting for SWIPT in QoS-constraint MTC Network: A Non-Cooperative G...
Energy Splitting for SWIPT in QoS-constraint MTC Network: A Non-Cooperative G...Energy Splitting for SWIPT in QoS-constraint MTC Network: A Non-Cooperative G...
Energy Splitting for SWIPT in QoS-constraint MTC Network: A Non-Cooperative G...IJCNCJournal
 
A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd Iaetsd
 
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGSCONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGSIJCNCJournal
 
Chain Based Wireless Sensor Network Routing Using Hybrid Optimization (HBO An...
Chain Based Wireless Sensor Network Routing Using Hybrid Optimization (HBO An...Chain Based Wireless Sensor Network Routing Using Hybrid Optimization (HBO An...
Chain Based Wireless Sensor Network Routing Using Hybrid Optimization (HBO An...IJEEE
 
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...IJCI JOURNAL
 
Energy efficient load balanced routing protocol for wireless sensor networks
Energy efficient load balanced routing protocol for wireless sensor networksEnergy efficient load balanced routing protocol for wireless sensor networks
Energy efficient load balanced routing protocol for wireless sensor networkscsandit
 
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
 
Energy conservation in wireless communication systems with relays
Energy conservation in wireless communication systems with relaysEnergy conservation in wireless communication systems with relays
Energy conservation in wireless communication systems with relaysAniruddha Chandra
 
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...IJERA Editor
 
Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...ijwmn
 
Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...
Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...
Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...IJECEIAES
 
Green Communication
Green CommunicationGreen Communication
Green CommunicationVARUN KUMAR
 
Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...IJECEIAES
 

What's hot (17)

Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
 
Energy Splitting for SWIPT in QoS-constraint MTC Network: A Non-Cooperative G...
Energy Splitting for SWIPT in QoS-constraint MTC Network: A Non-Cooperative G...Energy Splitting for SWIPT in QoS-constraint MTC Network: A Non-Cooperative G...
Energy Splitting for SWIPT in QoS-constraint MTC Network: A Non-Cooperative G...
 
A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks
 
M0111397100
M0111397100M0111397100
M0111397100
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by using
 
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGSCONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
 
Chain Based Wireless Sensor Network Routing Using Hybrid Optimization (HBO An...
Chain Based Wireless Sensor Network Routing Using Hybrid Optimization (HBO An...Chain Based Wireless Sensor Network Routing Using Hybrid Optimization (HBO An...
Chain Based Wireless Sensor Network Routing Using Hybrid Optimization (HBO An...
 
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
 
Energy efficient load balanced routing protocol for wireless sensor networks
Energy efficient load balanced routing protocol for wireless sensor networksEnergy efficient load balanced routing protocol for wireless sensor networks
Energy efficient load balanced routing protocol for wireless sensor networks
 
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
 
Energy conservation in wireless communication systems with relays
Energy conservation in wireless communication systems with relaysEnergy conservation in wireless communication systems with relays
Energy conservation in wireless communication systems with relays
 
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
 
Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...
 
Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...
Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...
Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...
 
Green Communication
Green CommunicationGreen Communication
Green Communication
 
Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...
 
Aq4103266271
Aq4103266271Aq4103266271
Aq4103266271
 

Similar to Efficient Power Allocation for NOMA 5G Systems

EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...IJECEIAES
 
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...ijcseit
 
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...ijcseit
 
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...ijcseit
 
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...IJECEIAES
 
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...IRJET Journal
 
A Survey- Energy Efficient Techniques in WBAN
A Survey- Energy Efficient Techniques in WBANA Survey- Energy Efficient Techniques in WBAN
A Survey- Energy Efficient Techniques in WBANIRJET Journal
 
Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...Pvrtechnologies Nellore
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
Best sum-throughput evaluation of cooperative downlink transmission nonorthog...
Best sum-throughput evaluation of cooperative downlink transmission nonorthog...Best sum-throughput evaluation of cooperative downlink transmission nonorthog...
Best sum-throughput evaluation of cooperative downlink transmission nonorthog...IJECEIAES
 
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...IJECEIAES
 
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...IJECEIAES
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
 
Network efficiency enhancement by reactive channel state based allocation sch...
Network efficiency enhancement by reactive channel state based allocation sch...Network efficiency enhancement by reactive channel state based allocation sch...
Network efficiency enhancement by reactive channel state based allocation sch...IJECEIAES
 
Downlink massive full dimension-multiple input multiple output downlink beam...
Downlink massive full dimension-multiple input multiple output  downlink beam...Downlink massive full dimension-multiple input multiple output  downlink beam...
Downlink massive full dimension-multiple input multiple output downlink beam...IJECEIAES
 
O N THE E VALUATION OF G MSK S CHEME W ITH ECC T ECHNIQUES IN W IRELESS S...
O N THE E VALUATION OF G MSK  S CHEME  W ITH  ECC T ECHNIQUES IN W IRELESS  S...O N THE E VALUATION OF G MSK  S CHEME  W ITH  ECC T ECHNIQUES IN W IRELESS  S...
O N THE E VALUATION OF G MSK S CHEME W ITH ECC T ECHNIQUES IN W IRELESS S...ijwmn
 
Integrated approach for efficient power consumption and resource allocation i...
Integrated approach for efficient power consumption and resource allocation i...Integrated approach for efficient power consumption and resource allocation i...
Integrated approach for efficient power consumption and resource allocation i...IJECEIAES
 
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless NetworksEnhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless NetworksIJRES Journal
 
Approach to minimizing consumption of energy in wireless sensor networks
Approach to minimizing consumption of energy in wireless sensor networks Approach to minimizing consumption of energy in wireless sensor networks
Approach to minimizing consumption of energy in wireless sensor networks IJECEIAES
 

Similar to Efficient Power Allocation for NOMA 5G Systems (20)

EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...
 
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
 
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
 
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
GENERALIZED POWER ALLOCATION (GPA) SCHEME FOR NON-ORTHOGONAL MULTIPLE ACCESS ...
 
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
 
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
 
A Survey- Energy Efficient Techniques in WBAN
A Survey- Energy Efficient Techniques in WBANA Survey- Energy Efficient Techniques in WBAN
A Survey- Energy Efficient Techniques in WBAN
 
Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Lte
LteLte
Lte
 
Best sum-throughput evaluation of cooperative downlink transmission nonorthog...
Best sum-throughput evaluation of cooperative downlink transmission nonorthog...Best sum-throughput evaluation of cooperative downlink transmission nonorthog...
Best sum-throughput evaluation of cooperative downlink transmission nonorthog...
 
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
 
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
Network efficiency enhancement by reactive channel state based allocation sch...
Network efficiency enhancement by reactive channel state based allocation sch...Network efficiency enhancement by reactive channel state based allocation sch...
Network efficiency enhancement by reactive channel state based allocation sch...
 
Downlink massive full dimension-multiple input multiple output downlink beam...
Downlink massive full dimension-multiple input multiple output  downlink beam...Downlink massive full dimension-multiple input multiple output  downlink beam...
Downlink massive full dimension-multiple input multiple output downlink beam...
 
O N THE E VALUATION OF G MSK S CHEME W ITH ECC T ECHNIQUES IN W IRELESS S...
O N THE E VALUATION OF G MSK  S CHEME  W ITH  ECC T ECHNIQUES IN W IRELESS  S...O N THE E VALUATION OF G MSK  S CHEME  W ITH  ECC T ECHNIQUES IN W IRELESS  S...
O N THE E VALUATION OF G MSK S CHEME W ITH ECC T ECHNIQUES IN W IRELESS S...
 
Integrated approach for efficient power consumption and resource allocation i...
Integrated approach for efficient power consumption and resource allocation i...Integrated approach for efficient power consumption and resource allocation i...
Integrated approach for efficient power consumption and resource allocation i...
 
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless NetworksEnhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
 
Approach to minimizing consumption of energy in wireless sensor networks
Approach to minimizing consumption of energy in wireless sensor networks Approach to minimizing consumption of energy in wireless sensor networks
Approach to minimizing consumption of energy in wireless sensor networks
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

Efficient Power Allocation for NOMA 5G Systems

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 2, April 2020, pp. 2139∼2150 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i2.pp2139-2150 Ì 2139 Efficient power allocation method for non orthogonal multiple access 5G systems Maan A. S. Al-Adwany Department of Computer and Information Engineering, Ninevah University, Iraq Article Info Article history: Received Apr 10, 2019 Revised Oct 19, 2019 Accepted Oct 27, 2019 Keywords: IDMA NOMA Power allocation ABSTRACT One of the hot research topics for the upcoming 5G (fifth-generation) wireless communication networks is the non orthogonal multiple access (NOMA) systems, where it have attracted both industrial and academic fields to improve the existing spectral efficiency. In fact, the multiuser detection process for NOMA systems is largely affected by the power distribution of the received signals. In this paper, a new method has been proposed to control the transmit power among active users in one of the promising NOMA systems; the interleave division multiple access (IDMA) which has been adopted here for consideration. Unlike conventional methods, where tedious mathematical computations are required; a simple and direct method has been derived. The proposed method has been applied to IDMA system with different FEC codes. The obtained results show that the proposed method outperforms the conventional one as compared to optimal results. Copyright c 2020 Insitute of Advanced Engineeering and Science. All rights reserved. Corresponding Author: Maan Ahmed Shehathah Al-Adwany, Assistant Professor at Department of Computer and Information Engineering, College of Electronics Engineering, Ninevah University, Mosul, Iraq. Email: maanaladwany@yahoo.com 1. INTRODUCTION Researchers have considered multiuser detection techniques for spread spectrum wireless communi- cations systems and, recently, for non orthogonal multiple access (NOMA) systems. In fact, the multiuser detection process is largely affected by the power of the received signals [1-3]. Thus, managing these powers is crucial for interference suppression and the stability of the NOMA systems [4, 5]. In addition, one of the major design concerns is the power consumption reduction for mobile devices. Thus, minimization of total power received by uplink receiver is required while maintaining the SINR (signal to interference plus noise ratio) on certain desired level at final iteration of multiuser detector. That is so called the ’power allocation problem’. Recently, researchers spare no effort to solve the power allocation problem in NOMA system [1,2,6-9], while early researches on power allocation problem were equally important that can be found elsewhere [10-15]. Although the methods that have been proposed in the literatureare have involved difficult computations; they did not lead to exact solutions as one may expect. This, in turn, encouraged me to derive a simple method to solve power allocation problem in IDMA as one of the promising NOMA systems for 5G. The contribution of this paper can be summerized with the following points: (a) This paper presents a method which could be an efficient alternative to the existing power allocation methods for IDMA system. (b) The proposed method draws its strength from being simple and direct. It depends only on the forward error correcting (FEC) rate to solve power allocation problem in IDMA system; whereas other methods usually use linear programing or complex analytical approaches. Journal homepage: http://ijece.iaescore.com/index.php/IJECE
  • 2. 2140 Ì ISSN: 2088-8708 This paper is organized as follows: after the introduction, the IDMA uplink system is briefly described in section 2 in order for a reader to focus only on the power allocation problem which is presented in section 3. Whereas a modelling of the proposed method is considered in section 4. Numerical results are then discussed in section 5. Finally, the conclusions are drawn in section 6. 2. IDMA UPLINK SYSTEM Interleave Division Multiple Access (IDMA) is a promising non orthogonal multiple access system [16-19], so it has been adopted for consideration in this research. It can be considered as a special case of spread spectrum systems. In IDMA system the users are identified by their unique interleavers [20-27], while in spread spectrum systems such as CDMA the users are identified by their unique codes. The mechanism of the IDMA uplink system can be clarified according to the schematic diagram shown in Figure 1. Multiple Access Channel FEC encoder Convolutional Encoder Repetition Code Interleaver 1 h1 User1 FEC encoder Convolutional Encoder Repetition Code Interleaver 2 h2 User2 FEC encoder Convolutional Encoder Repetition Code Interleaver K hK UserK Elementary Signal Estimator (ESE) Decoder De-interleaver 2 User2 Interleaver 2 Decoder De-interleaver K UserK Interleaver K Decoder De-interleaver 1 User1 Interleaver 1 Figure 1. The structure of the IDMA system At the transmit side, the information bits of each user are encoded using certain FEC (forward-error- correction) codes that are assumed the same for all users. Each FEC code is achieved by serial concatena- tion of convolutional code of rate Rc along with a repetition code of rate Rp resulting a total FEC code rate of Rt=RcRp. Consequently, the system can be considered to have a total spreading factor SF = 1/Rt. Figure 2. illustrates some well-known FEC codes that have been used in this paper. After that, the encoded bits (also called chips) are organized into frames each has length of 1024; to be prepared for the interleaving process where each user is assigned a unique interleaver. In IDMA, the key principle is that the user specific in- terleavers should have minimum cross correlation and must be generated randomly and independently. In fact, these user specific interleavers make a dispersion in the encoded sequences which produces an approximately uncorrelated adjacent chips; this in turn facilitates the receiver detection process. The interleavers at receiver and transmitter sides should be stored somewhere at the base station by utilizing a memory prepared for this purpose. Throughout the duration of the initial link setting-up stage, the base station and the mobile stations must exchange messages to tell each other about the employed interleavers. In this paper, in order to focus on the power allocation problem, it is assumed that the employed interleavers are optimum. Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2139 – 2150
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2141 Convolutional Code Repetition Code Rate (Rp) Total Code Rate (Rt=Rc Rp) Total Spreading Factor SF=1/Rt kmaxCode generator (octal) Constraint length Feedback Code Rate (Rc) FEC1 (237 345)8 8 (237)8 1/2 1/8 1/16 16 12 FEC2 (27 31)8 5 (27)8 1/2 1/8 1/16 16 13 FEC3 (5 3)8 3 (5)8 1/2 1/8 1/16 16 18 FEC4 (23 35)8 5 (23)8 1/2 1/4 1/8 8 7 Figure 2. Some FEC codes that were used in this research The interleaver output is then scaled by coefficient for each user hk; which is assumed to constitute the combined effect of the channel loss and power control factor. In other words, the distribution of h2 k can be fitted via power control process. The signals of all active users are assumed to be superimposed into a wireless flat fading channel. At the receive side, the receiver is composed of elementary signal estimator (ESE) along with a bank of K decoders (DECs) corresponding to K users. The DECs are a posteriori probability (APP) decoders. A related point to consider, is that the operation of the receiver is mainly based on multiple access channel and the FEC code constraints. The outcomes of the ESE and DECs are combined, via an iterative process, to retrieve the transmitted bits. It is suitable here to mention that we have designed and achieved the IDMA uplink system simulator using MATLAB, but it has not been included in this paper to avoid redundancy. 3. PROBLEM FORMULATION As mentioned before, the performance of IDMA system can be enhanced through suitable power allocation. The proper power distribution among users will highly increase the chance for correct signal detection at the receiver. Strong signals are firstly detected. Consequently, their interference effect on weak signals can be correctly removed which in turn increase the chance of weak signal detection. The main research question here is: how to allocate the power levels among users?. In general, the power allocation problem can be solved by dividing the total number of multiple access users into groups, where for each a certain power level is assigned. As a consequence, the former research question triggers the following three sub-questions: (a) What is the proper size for each group? (b) What is the proper power level for each group to achieve feasible target BER? (c) If 1 and 2 are satisfied, has the total transmitted power (Pt) from all active users been minimized as a result? Early researches tried to solve this issue; for instance Schlegel et al. [28] proved that the minimum total power can be achieved when the groups have an equal number of users; so one can adopt this assumption as a foundation to meet other sub-questions. Therefore, the objective of this research becomes how to find the proper power level for each group so that the minimum total power condition is satisfied with feasible BER (typically 10−6 ). 4. MODELLING OF PROPOSED METHOD Unlike the existing researches, this paper have revealed a new feature for FEC codes which can be utilized to solve the power allocation problem. The feature tells us that all FEC codes can support limitted number of users (users with same power level). However, exceeding this limit leads to degradation in system performance. Figure 3 shows the simulation results of the BER with number of equal power users for dif- ferent FEC codes. One can observe that for each FEC code, a target BER of 10−6 can be achieved as long as the number of users do not exceed certain threshold say kmax. Above this threshold, the BER jumps to infeasible values. In this work, such a feature has been exploited to solve the power allocation problem. It is obvious, from the former figure, that kmax for the codes FEC1, FEC2, and FEC3, are 12, 13, and 18, respectively. Efficient power allocation method for non orthogonal... (Maan A. S. Al-Adwany)
  • 4. 2142 Ì ISSN: 2088-8708 Figure 2 demonstrates some FEC codes with their corresponding kmaxs. To clarify our proposed method, it is suitable to discuss the following example. Assume an IDMA (NOMA) system with BPSK mapping of SNR = 10dB and with the following specifications: the total number of users (K) is 32; a FEC code consisting of convolutional code of rate 1/2 serially concatenated with a repetition code of length 8 (i.e Rp = 1/8). Thus the total FEC rate is Rt = 1/16 . In order to distribute the power among active users; first, one should divide the total number of users K into groups. We start with the case of 32 groups, each group consists of one user. Now, assume that the power set {p∗ 1 p∗ 2 ... p∗ 32} represents a solution to the power allocation problem. The power set should satisfy two conditions: a minimum total power; and convergence to feasible BER. By assuming that the up- link users have the same transmission rate, one can prove that the power set should follow a constant ratio according to [29]; hence: p∗ 2/p∗ 1 = p∗ 3/p∗ 2.... = p∗ K/p∗ K−1 = Ψ where Ψ represents power ratio. Assume p∗ 1 represents the minimum transmit power allowed for each user (pmin), hence the power set can be rewritten as: {pmin βpmin β2 pmin .....β31 pmin} or pmin{1 β β2 .....β31 } The power ratio (Ψ) in this case is equal to β. It is worth mentioning that pmin can be determined according to the wireless system requirements. Thus, solution of the power allocation problem is mainly achieved by finding β . Since total power should be minimized, hence the power allocation problem can be solved by finding the minimum β (i.e. βmin ), or for the sake of generality Ψmin. 0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 10 −10 10 −8 10 −6 10 −4 10 −2 10 0 N BER FEC1 FEC2 FEC3 kmax1 kmax3 kmax2 SF=16 Figure 3. BER vs. number of equal power users 4.1. Finding minimum power ratio (βmin) Going forward to find βmin, assume that g represents the number of users per group (or the group size). Thus, for the same total number of users K = 32, in order to increase the group size from 1 to 2 one should raise the power ratio Ψ from β to β2 as shown in Figure 4; starting from rightmost column . This is logically acceptable if one thinks of it as to ensure that each group will have enough power for converging to the target BER. By the same way, in order to increase g to 4, the power ratio Ψ should be increased to β4 , and so on. Figure 4 shows the possible group sizes along with the corresponding power ratios. In general, one can observe that for certain group size (g); the corresponding power ratio should be βg . Figure 5 illustrates the effect of group size on the power ratio. It is obvious that as the group size increases, the required power ratio also increases. While for certain FEC code, as the group size approaches kmax, the required power ratio fairly increases. Thus, in order to avoid unwanted increase in total power, we recommend that the maximum group size should not approach kmax for given FEC code. Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2139 – 2150
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2143 Total number of users=32 2 groups 4 groups 8 groups 16 groups 32 groups g=16 users/group g=8 users/group g=4 users/group g=2 users/group g=1 users/group Power Ratio(Ψ)=β16 Power Ratio(Ψ)=β8 Power Ratio(Ψ)=β4 Power Ratio(Ψ)=β2 Power Ratio(Ψ)=β β0 β0 β0 β0 β0 β1 β2 β2 β3 β4 β4 β4 β5 β6 β6 β7 β8 β8 β8 β8 β9 β10 β10 β11 β12 β12 β12 β13 β14 β14 β15 β16 β16 β16 β16 β16 β17 β18 β18 β19 β20 β20 β20 β21 β22 β22 β23 β24 β24 β24 β24 β25 β26 β26 β27 β28 β28 β28 β29 β30 β30 β31 Pt5 = g Pmin (β0 + β16 ) Pt4 = g Pmin (β0 + β8 +β16 +β24 ) Pt3 = g Pmin (β0 + β4 +β8 +....+β28 ) Pt2 = g Pmin (β0 + β2 +β4 +....+β30 ) Pt1 = g Pmin (β0 + β1 +β2 +....+β31 ) Figure 4. Estimated power ratios for different group sizes 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 0 5 10 15 20 25 30 Number of users per group (g) PowerRatio(Ψ) FEC1 FEC3 kmax1 kmax3 Figure 5. Power ratio vs. group size for different FEC codes Efficient power allocation method for non orthogonal... (Maan A. S. Al-Adwany)
  • 6. 2144 Ì ISSN: 2088-8708 The important note here is that for certain FEC code (say FEC3), the sum of the users’ normalized powers should not exceed kmax as seen by the receiver; otherwise the BER jumps to infeasible values as shown in Figure 3. So; PT otal Pmax ≤ kmax (1) Now, assume that the number of groups is decreased from 32 down to 2. Thus, each of the resulting two groups would have the maximum number of users gmax (where gmax = 16 in our example). Hence, one can derive; (gmaxPmin + gmaxPmax) Pmax ≤ kmax (2) where in this case Pmax = βgmax Pmin, thus; gmax βgmax + gmax ≤ kmax (3) which leads to; β ≥ ( gmax kmax − gmax ) 1 gmax (4) Since total power should be minimized, which means minimum power ratio among groups, hence one can write; βmin = ( gmax kmax − gmax ) 1 gmax (5) where gmax < kmax. Knowing that gmaxand kmax are integers, and gmax should have maximum value; thus gmax = kmax − 1. Substituting for gmax; βmin = (kmax − 1)( 1 kmax−1 ) (6) It is obvious that one can find a solution for power allocation problem for any FEC code by knowing its kmax, which is the objective of this research. However, by knowing that every FEC code has its own kmax, which may be somewhat difficult to find; hence it is preferable if one can make further simplification to equation (6). 4.2. Simplification of equation (6) In order to understand (6), it is preferable to study its characteristics. Figure 6 shows the variation of the minimum power ratio βmin versus range of kmax integer values. One can observe that for kmax > 4 (which is the case in practical FEC codes), increasing kmax always results in decreasing the power ratio βmin . This will in turn reduce the total power. Although larger values of βmin ensure iterative receiver convergence to the target BER with fewer iterations, but it will be at the expense of unwanted increase in total power. Thus, a reasonable trade-off should be achieved. Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2139 – 2150
  • 7. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2145 0 4 8 12 16 20 24 28 32 36 40 44 48 1 1.05 1.1 1.15 1.2 1.25 1.3 1.35 1.4 1.45 kmax MinimumPowerRatio(βmin) power ratio=β∗ min kmax = SF Figure 6. βmin vs. kmax In order to make a proper trade-off, Figure 3 should be studied carefully. By looking from the line N = 16 = SF, one can note that strong FEC codes such as FEC1 and FEC2 have kmax < SF. Whereas weak FEC codes (such as FEC3) have kmax > SF. Thus, it may be suitable to consider SF as the average value for kmax for a range of FEC codes; from the strongest one to weakest. According to the previous discussion, an acceptable trade-off can be achieved by replacing kmax in (6) by SF. This replacement leads to simplify (6) to; β∗ min ≈ (SF − 1)( 1 SF −1 ) (7) Thus, in order to find the power ratio β∗ min we only need to know the total spreading factor ( SF = 1/RcRp) rather than knowing kmax for each code. So, generally speaking, to find the minimum power ratio Ψmin for certain group size (g), the rule can be rewritten in the following final general form; Ψmin|g = (β∗ min)g ≈ (SF − 1)( g SF −1 ) (8) It is worth mentioning that the rule in equation (8) is derived under assumption that the users who undergo the power control process should utilize the same total FEC rate. 4.3. Proposed power allocation algorithm Figure 7 shows the proposed power allocation algorithm. It starts by entering total number of users, total FEC rate, and the minimum transmit power allowed for each user. Then an initial value for group size (g) is assumed to be 1. After that, the algorithm runs to find the group size that satisfies the minimum total power; then allocates the power among users accordingly. 5. RESULTS AND DISCUSSION To verify the ability of our proposed method to solve the power allocation problem, the method has been applied to different FEC codes. For the sake of simplicity, FEC3 is discussed. Figure 8 shows two methods of finding the power ratio; our proposed method (green color) and one of the conventional methods for NOMA (brown color) [1,2,4,6-10,28] compared to the corresponding optimum method (blue color). Compared with the optimal results, the proposed method seems in good agreement. However, saying ”in good agreement” can not be considered as a measure. So, one should put a measure to describe the degree of agreement precisely. Thus, in this paper a term coincidence (C) has been used to represent this measure of agreement; more generally the percentage coincidence which can be expressed as C = (1 − ) × 100% , where; = Ψestimated − Ψoptimum Ψoptimum (9) C = 1 − Ψestimated − Ψoptimum Ψoptimum × 100% (10) Efficient power allocation method for non orthogonal... (Maan A. S. Al-Adwany)
  • 8. 2146 Ì ISSN: 2088-8708 Start Set Counter 𝑖𝑖 = 1. Distribute Users into Groups: Group Size 𝑔𝑔 = 2(𝑖𝑖−1) . Calculate the Minimum Power Ratio: 𝛽𝛽𝑚𝑚𝑚𝑚𝑚𝑚 = (𝑆𝑆𝑆𝑆 − 1)� 1 𝑆𝑆𝑆𝑆 −1 � . Calculate the Power Ratio (𝛹𝛹) According to the Group Size: 𝛹𝛹𝑚𝑚𝑚𝑚𝑚𝑚 (𝑔𝑔) = 𝛽𝛽𝑚𝑚𝑚𝑚𝑚𝑚 𝑔𝑔 . 𝑃𝑃𝑡𝑡 = 𝑔𝑔 × 𝑃𝑃 𝑚𝑚𝑚𝑚𝑚𝑚 ∗ � 𝛽𝛽𝑚𝑚𝑚𝑚𝑚𝑚 (𝑛𝑛−1)×𝑔𝑔 � 𝐾𝐾 𝑔𝑔 � 𝑛𝑛=1 Calculate Total Power: is Pt minimum ? 𝐾𝐾 2𝑔𝑔 > 2 ? 𝑖𝑖 = 𝑖𝑖 + 1 Follow the Steps to Allocate the Power Among Users: 1-Distribute Users into 𝐾𝐾 𝑔𝑔 Groups. 2-Follow Table 2 for Suitable Power Allocation. YES NO YES NO Enter K: Total Number of Users. Total FEC Rate: 𝑅𝑅𝑡𝑡 = 𝑅𝑅𝑐𝑐 × 𝑅𝑅𝑝𝑝. Pmin: Minimum Transmit Power Allowed For User. Calculate the Spreading Factor: 𝑆𝑆𝑆𝑆 = 1 𝑅𝑅𝑡𝑡 . Figure 7. Proposed power allocation algorithm 2 4 6 8 10 12 14 16 0 2 4 6 8 10 12 14 16 18 Number of users per group (g) PowerRatio(Ψ) Ψ calculated using NOMA proposed method Ψ calculated using NOMA conventional methods Ψ Optimum Figure 8. Comparison among different methods of finding the power ratio for FEC3 Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2139 – 2150
  • 9. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2147 Figure 9 illustrates the degree of coincidence of the proposed method as compared to the conventional one. It is clear that for the conventional method, the coincidence (C) is excellent for g = 4 or fewer; whereas it drops down for g larger than 4. However, our proposed method shows better performance especially for g larger than 4. Accordingly, one may decide to distribute users into small groups (low values of g ) for the sake of maximum coincidence. However, in the power allocation problem some other parameters must be taken into account. One of these, is the total power consumed by active users (Pt). It is known that the purpose behind the power allocation is to distribute power among users to facilitate the multi-user detection process, with minimum total power consumption. Thus, one should choose minimum Pt. Figure 10 illustrates that our proposed method can achieve a minimum total power of 25dB at g = 16, whereas the conventional method achieves 27dB at g = 1. 2 4 6 8 10 12 14 16 0 10 20 30 40 50 60 70 80 90 100 Number of users per group (g) Coincidence% NOMA Conventional Method NOMA Proposed Method Figure 9. Percentage coincidence vs. g for FEC3 2 4 6 8 10 12 14 16 20 25 30 35 40 45 50 55 Number of users per group (g) RelativeTotalPower[dB] NOMA Conventional Method NOMA Proposed Method Figure 10. Relative total power vs. g for FEC3 It is clear that our proposed method reduces the total power by 2dB at g = 16. According to Figure 8, g = 16 corresponds to significant increase in the power ratio (green color) as compared to the optimum one. Fortunately, this increase will facilitate the detection process by reducing the number of itera- tions needed to reach the target BER as shown in Figure 11. 1 5 10 15 10 15 20 25 30 35 40 45 50 55 60 Number of users per group (g) NumberofIterations NOMA Optimal Method NOMA Proposed Method Figure 11. Receiver iterations vs. group size. A comparison between the proposed method and the simulation results for FEC3 It is important here to mention that the ‘optimum method’ denotes to the method that achieves the minimum total power regardless the number of receiver iterations required to reach target BER. Now, referring to Figure 11, our proposed method shows considerable reduction in the number of iterations over the possible values of g. This can be interpreted as follows: from the iterative receiver point of view, the increase in the power ratio Ψ increases the receiver ability to discriminate among users groups. This in turn Efficient power allocation method for non orthogonal... (Maan A. S. Al-Adwany)
  • 10. 2148 Ì ISSN: 2088-8708 enhances the receiver ability to converge to the target BER ( 10−6 ) with fewer number of iterations. In other words, it means reducing the time for receiver to achieve its assigned task. Figure 12 illustrates the percentage reduction in the time required by the receiver to converge to the target BER which is called here ’Task Time Reduction’. It is clear that choosing g = 16 can reduce task time by 47%. Moreover, to further verify the validity of our proposed method; we have applied it to different FEC codes. Figure 13 and Figure 14 show the relative total power graphs for FEC2 and FEC1, respectively. It is clear that our proposed method outperforms the conventional one by increasing the FEC code constraint length. In other words, the proposed method performs better as the FEC code becomming stronger. 1 5 10 15 45 50 55 60 65 70 75 80 85 90 95 Number of users per group (g) TaskTimeReduction% Figure 12. The percentage Task Time reduction vs. g for FEC3 2 4 6 8 10 12 20 25 30 35 40 45 50 55 Number of users per group (g) RelativeTotalPower[dB] NOMA Conventional Method NOMA Proposed Method Figure 13. Relative total power vs. g for FEC2 1 2 3 4 5 6 7 8 9 10 20 25 30 35 40 45 50 55 60 Number of users per group (g) RelativeTotalPower[dB] NOMA Conventional Method NOMA Proposed Method Figure 14. Relative total power vs. g for FEC1 6. CONCLUSIONS In this paper, a new method has been derived to simplify the solution of the power allocation problem in one of the promising NOMA systems; that is the IDMA system. Compared with the conventional methods, the proposed method is proved to be efficient and easy to apply because it needs only total system FEC rate to find a solution to the power allocation problem. Finally, the obtained numerical results show that this simple method is more feasible than its counterparts and could be applied right away. REFERENCES [1] J. Zhu, et al., ”On optimal power allocation for downlink non-orthogonal multiple access systems,” IEEE Journal on Sel. Areas in Comm., vol. 35, no. 12, pp. 2744–2757, 2017. Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2139 – 2150
  • 11. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2149 [2] M. S. Ali, et al., ”Downlink power allocation for CoMP-NOMA in multi-cell networks,” IEEE Trans. on Comm., vol. 66, no. 9, pp. 3982–3998, 2018. [3] Z. Ding, P. Fan, and H. V. Poor, ”Impact of user pairing on 5g nonorthogonal multiple-access downlink transmissions,” IEEE Trans. on Vehicular Tech., vol. 65, no. 8, pp. 6010–6023, 2016. [4] E. R. Rezagah, T. Yoshioka, and N. Suzuki, ”Power allocation for uplink non-orthogonal multiple access in 5G,” 2017 International Conf. on Wireless Comm., Signal Proc. and Networking (WiSPNET), pp. 16–20, 2017. [5] K. Senel and S. Tekinay, ”Optimal power allocation in noma systems with imperfect channel estimation,” 2017 IEEE Global Comm. Conf. (GLOBECOM 2017), pp. 1–7, 2017. [6] F. Fang, J. Cheng, and Z. Ding, ”Joint energy efficient subchannel and power optimization for a downlink NOMA heterogeneous network,” IEEE Trans. on Vehicular Tech., vol. 68, no. 2, pp. 1351–1364, 2019. [7] W. U. Khan, et al., ”Efficient power allocation in downlink multi-cell multi-user NOMA networks,” IET Comm., vol. 13, no. 4, pp. 396–402, 2019. [8] X. Chen, et al., ”Optimal power allocations for non-orthogonal multiple access over 5G full/half-duplex relaying mobile wireless networks,” IEEE Trans. on Wireless Comm., vol. 18, no. 1, pp. 77–92, 2019. [9] S. Ma, et al., ”Optimal power allocation for mobile users in non-orthogonal multiple access visible light communication networks,” IEEE Trans. on Comm., vol. 67, no. 3, pp. 2233–2244, 2019. [10] L. Ping and L. Liu, ”Analysis and design of IDMA systems based on snr evolution and power allocation,” IEEE 60th Vehicular Tech. Conf. VTC2004-Fall, vol. 2, pp. 1068–1072, 2004. [11] L. Ping, ”Interleave division multiple-access,” IEEE Trans. on Wireless Comm., vol. 5, no. 4, pp. 938–947, 2006. [12] Z. Rosberg, ”Optimal transmitter power control in interleave division multiple access (IDMA) spread spectrum uplink channels,” IEEE Trans. on Wireless Comm., vol. 6, no. 1, pp. 192–201, 2007. [13] P. Weitkemper and K. D. Kammeyer, ”Power optimization of IDMA systems with different target BER constraints,” 2007 IEEE 65th Vehicular Tech. Conf. VTC2007-Spring, pp. 2812–2816, 2007. [14] M. S. K. Lau, W. Yue, and P. Wang, ”On a power allocation method for IDMA systems,” IEEE Trans. on Wireless Comm., vol. 7, no. 8, pp. 2905–2910, 2008. [15] P. Wang, J. Xiao, and L. Ping, ”Comparison of orthogonal and nonorthogonal approaches to future wire- less cellular systems,” IEEE Veh. Tech. Mag., vol. 1, no. 3, pp. 4–11, 2006. [16] Y. Chen, ”Exploiting gaussian approximation for non-orthogonal coded access,” 2018 IEEE 87th Vehicu- lar Tech. Conf. (VTC Spring), pp. 1–5, 2018. [17] R. Keating, R. Ratasuk, and A. Ghosh, ”Investigation of non-orthogonal multiple access techniques for future cellular networks,” 2017 IEEE 86th Vehicular Tech. Conf. (VTC-Fall), pp. 1–5, 2017. [18] P. Marsch, et al., ”5G radio access network architecture: Design guidelines and key considerations,” IEEE Comm. Mag., vol. 54, no. 11, pp. 24–36, 2016. [19] L. Dai, et al., ”Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends,” IEEE Comm. Mag., vol. 53, no. 9, pp. 74–81, 2015. [20] I. M. Mahafeno, C. Langlais, and C. Jego, ”OFDM-IDMA versus IDMA with ISI cancellation for qua- sistatic rayleigh fading multipath channels,” 4th Int. Symp. Turbo Codes and Related Topics; 6th Interna- tional ITG-Conf. on Source and Channel Coding, pp. 1–6, 2006. [21] K. Kusume, G. Bauch, and W. Utschick, ”IDMA vs.CDMA: Analysis and comparison of two multiple access schemes,” IEEE Trans. on Wireless Comm., vol. 11, no. 1, pp. 78-87, 2012. [22] P. Hammarberg, F. Rusek, and O. Edfors, ”Channel estimation algorithms for OFDM-IDMA: Complexity and performance,” IEEE Trans. on Wireless Comm., vol. 11, no. 5, pp. 1722–1732, 2012. [23] C. Novak, G. Matz, and F. Hlawatsch, ”IDMA for the multiuser MIMO-OFDM uplink: A factor graph framework for joint data detection and channel estimation,” IEEE Trans. on Signal Proc., vol. 61, no. 16, pp. 4051–4066, 2013. [24] K. Wu, K. Anwar, and T. Matsumoto, ”BICM-ID-based IDMA using extended mapping,” IEICE Trans. on Comm., vol. E97-B, no. 7, pp. 1483–1492, 2014. [25] L. Liu, et al., ”Quantize-and-forward strategy for interleave-division multiple-access relay channel,” IEEE Trans. Veh. Tech., vol. 65, no. 3, pp. 1808–1814, 2016. [26] L. Bing, et al., ”Design and performance analysis of multiuser CPM with single user detection complex- ity,” IEEE Trans. on Wireless Comm., vol. 15, no. 6, pp. 4032–4044, 2016. [27] G. Song and J. Cheng, ”Distance enumerator analysis for interleave division multi-user codes,” IEEE Efficient power allocation method for non orthogonal... (Maan A. S. Al-Adwany)
  • 12. 2150 Ì ISSN: 2088-8708 Trans. on Info. Theory, vol. 62, no. 7, pp. 4039–4053, 2016. [28] C. Shlegel, Z. Zhenning, and M. Burnashev, ”Optimal power/rate allocation and code selection for it- erative joint detection of coded random CDMA,” IEEE Trans. on Info. Theory, vol. 52, no. 9, pp. 4286–4294,2006. [29] P. A. Hoeher and H. Schoeneich, ”Interleave-division multiple access from a multiuser theory point of view,” 4th Int. Symp. on Turbo Codes and Related Topics; 6th International ITG-Conf. on Source and Channel Coding, pp. 1–5, 2006. BIOGRAPHY OF AUTHOR Maan Ahmed Shehathah Al-Adwany born in Mosul/Iraq in August 1974. In 1997 he received his BSc degree from College of Engineering, University of Mosul, Electrical Engineering (Electronics and Communications), also he received his MSc degree in Electronics and Communications Engi- neering from the same institution in year 2000. He worked as assistant lecturer at Mosul University since 2001, and then is promoted to a lecturer degree in 2007 and to assistant professor degree in 2013. He published more than 20 papers in international journals and conferences. Furthermore, he was working as consulting member for the Engineering Consulting Bureau of the University of Mosul in many engineering industrial projects. Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2139 – 2150