This paper studies the two-hop transmission relying unmanned aerial vehicle (UAV) relays which is suitable to implement in the internet of things (IoT) systems. To enhance system performance in order to overcome the large scale fading between the base station (BS) and destination as well as achieve the higher spectrum efficiency, where non-orthogonal multiple access (NOMA) strategies were typically applied for UAV relays to implement massive connections transmission. In particular, outage probability is evaluated via signal to noise ratio (SNR) criterion so that the terminal node can obtain reasonable performance. The derivations and analysis results showed that the considered fixed power allocation scheme provides performance gap among two signals at destination.The numerical simulation confirmed the exactness of derived expressions in the UAV assisted system.
EE402B Radio Systems and Personal Communication Networks notesHaris Hassan
Programmes in which available:
Masters of Engineering - Electrical and Electronic
Engineering. Masters of Engineering - Electronic
Engineering and Computer Science. Master of Science -
Communication Systems and Wireless Networking.
Master of Science - Smart Telecom and Sensing
Networks. Master of Science - Photonic Integrated
Circuits, Sensors and Networks.
Lantiq/Intel Contributions to G.fast at Scientific ConferencesLantiq
Rainer Strobel (Lantiq - An Intel Company), Michael Joham and Wolfgang Utschick presented several articles in academic conferences together with the Technical University of Munich. A conference recently held (June 8 to 12) was the ICC (International Conference on Communications) in London.
Title: Achievable Rates with Implementation Limitations for G.fast-based Hybrid Copper/Fiber Networks
Abstract - Hybrid copper/fiber networks bridge the gap between the fiber link and the customer by using copper wires over the last meters. This solution combines energy efficiency and low cost of the copper access network with high data rates of a fiber connection. However, the fiber to the distribution point (FTTdp) network must prove its ability to convey data at fiber speed over copper wire bundles under the spectral constraints of the copper access network. This work investigates achievable data rates of the FTTdp network. It provides an analysis of the sources of performance loss in a system implementation due to complexity limitations. The results indicate that optimized linear methods perform well on shorter lines, while nonlinear methods have advantages for long lines.
Capsulization of Existing Space Time TechniquesIJEEE
In this paper, we explore the fundamental
concepts behind the emerging field of space-time coding for
wireless communication system. A space–time code (STC)
is a method which employed to increase the reliability of
data transmission in the wireless communication
systems using multiple transmit antennas.
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...Journal For Research
Wireless designers constantly seek to improve the spectrum efficiency/capacity, coverage of wireless networks and link reliability. In this direction, Space-time wireless technology that uses multiple antennas along with appropriate signaling and receiver techniques that offers a powerful tool for improving the wireless performance is used in this thesis work. A special version of STBC called ‘Alamouti code’ is used. PSK modulation scheme is used for modulation of data. In this thesis work, the Space-Time Block Codes (STBC) is used in WLAN wireless network that uses multiple numbers of antennas at both transmitter and receiver. The STBC which includes the Alamouti Scheme for 2 transmit antenna and a different number of receiving antenna has been studied, simulated and analyzed. The simulation has been done in MATLAB. Throughput and several parameter performance has been analyzed using the MATLAB.A sample image is transmitted to compare the performance of various parameters like RMSE, PSNR, MAE etc. All the parameters are plotted against SNR (in dB) values ranging from -18 to 30. Various observations being made for the improvement in various parameters with increasing SNR and/or with changing diversity scheme. AWGN channel is used here for communication of sampled image data.
EE402B Radio Systems and Personal Communication Networks notesHaris Hassan
Programmes in which available:
Masters of Engineering - Electrical and Electronic
Engineering. Masters of Engineering - Electronic
Engineering and Computer Science. Master of Science -
Communication Systems and Wireless Networking.
Master of Science - Smart Telecom and Sensing
Networks. Master of Science - Photonic Integrated
Circuits, Sensors and Networks.
Lantiq/Intel Contributions to G.fast at Scientific ConferencesLantiq
Rainer Strobel (Lantiq - An Intel Company), Michael Joham and Wolfgang Utschick presented several articles in academic conferences together with the Technical University of Munich. A conference recently held (June 8 to 12) was the ICC (International Conference on Communications) in London.
Title: Achievable Rates with Implementation Limitations for G.fast-based Hybrid Copper/Fiber Networks
Abstract - Hybrid copper/fiber networks bridge the gap between the fiber link and the customer by using copper wires over the last meters. This solution combines energy efficiency and low cost of the copper access network with high data rates of a fiber connection. However, the fiber to the distribution point (FTTdp) network must prove its ability to convey data at fiber speed over copper wire bundles under the spectral constraints of the copper access network. This work investigates achievable data rates of the FTTdp network. It provides an analysis of the sources of performance loss in a system implementation due to complexity limitations. The results indicate that optimized linear methods perform well on shorter lines, while nonlinear methods have advantages for long lines.
Capsulization of Existing Space Time TechniquesIJEEE
In this paper, we explore the fundamental
concepts behind the emerging field of space-time coding for
wireless communication system. A space–time code (STC)
is a method which employed to increase the reliability of
data transmission in the wireless communication
systems using multiple transmit antennas.
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...Journal For Research
Wireless designers constantly seek to improve the spectrum efficiency/capacity, coverage of wireless networks and link reliability. In this direction, Space-time wireless technology that uses multiple antennas along with appropriate signaling and receiver techniques that offers a powerful tool for improving the wireless performance is used in this thesis work. A special version of STBC called ‘Alamouti code’ is used. PSK modulation scheme is used for modulation of data. In this thesis work, the Space-Time Block Codes (STBC) is used in WLAN wireless network that uses multiple numbers of antennas at both transmitter and receiver. The STBC which includes the Alamouti Scheme for 2 transmit antenna and a different number of receiving antenna has been studied, simulated and analyzed. The simulation has been done in MATLAB. Throughput and several parameter performance has been analyzed using the MATLAB.A sample image is transmitted to compare the performance of various parameters like RMSE, PSNR, MAE etc. All the parameters are plotted against SNR (in dB) values ranging from -18 to 30. Various observations being made for the improvement in various parameters with increasing SNR and/or with changing diversity scheme. AWGN channel is used here for communication of sampled image data.
Telecommunication System Engineering NotesHaris Hassan
Telecommunications engineering, or telecoms engineering, is an engineering discipline centered on electrical and computer engineering which seeks to support and enhance telecommunication systems.
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...journalBEEI
Non-orthogonal multiple access (NOMA) with advantages such as superior spectral efficiency has been considered as a promising multiple access technique for the fifth-generation (5G) mobile networks. In this research, we propose energy harvesting (EH) NOMA system relaying network over Rayleigh fading channel using selection combining at the receiver. Firstly, we investigate the system performance in terms of the closed-form expression of the outage probability (OP). Here we compare the OP of two destination users of the proposed system. Finally, all the results is convinced by the Monte Carlo simulation. From the results, we can confirm that all the analytical and simulation results are the same in connection with the primary system parameters.
BER Performance of MU-MIMO System using Dirty Paper CodingIJEEE
In this paper Dirty Paper Coding for communication system is implemented. MIMO application that involves devices such as cell phones, pocket PCs require closely spaced antenna, which suffers from mutual coupling among antennas and high spatial correlation for signals. DPC is used for compensating the degradation due to correlation and mutual coupling.
Study on outage performance gap of two destinations on CR-NOMA networkTELKOMNIKA JOURNAL
Non-orthogonal multiple access (NOMA) and cognitive radio (CR) are promising to overcome spectral scarcity problem encountered in applications implementations in wireless communication. Especially, massive connectivity in such network is strict requirement in network deployment. This study aims to improve spectral efficiency at two secondary destinations by investigating a CR-NOMA network under situation of the perfect successive interference cancellation (SIC). We also derive the exact outage probability for secondary users. Furthermore, an approximate computation method is applied to indicate more insights. It is confirmed that the performance achieved together with performance gap among two users can be obtained due to different power allocation factors assigned to users.
Performance of MMSE Denoise Signal Using LS-MMSE TechniqueIJMER
This paper presents performance of mmse denoises signal using consistent cycle spinning (ccs) and least square (LS) techniques. In the past decade, TV denoise technique is used to reduced the noisy signal. The main drawback is the low quality signal and high MMSE signal. Presently, we
proposed the CCS-MMSE and LS-MMSE technique .The CCS-MMSE technique consists of two steps. They are wavelet based denoise and consistent cycle spinning. The wavelet denoise is powerful decorrelating effect on many signal domains. The consistent cycle spinning is used to estimation the
MMSE in the signal domain. The LS-MMSE is better estimation of MMSE signal domain compare to
CCS-MMSE.The experimental result shows the average MMSE reduction using various techniques.
Performance of cognitive radio networks with maximal ratio combining over cor...Polytechnique Montreal
In this paper, we apply the maximal ratio combining (MRC) technique to achieve higher detection probability in cognitive radio networks over correlated Rayleigh fading channels. We present a simple approach to derive the probability of detection in closed-form expression. The numerical results reveal that the detection performance is a monotonically increasing function with respect to the number of antennas. Moreover, we provide sets of complementary receiver operating characteristic (ROC) curves to illustrate the effect of antenna correlation on the sensing performance of cognitive radio networks employing MRC schemes in some respective scenarios.
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELIJCSES Journal
High transmission data rate, spectral efficiency and reliability are essential for future wireless
communications systems. MIMO (multi-input multi-output) diversity technique is a band width efficient
system achieving high data transmission which eventually establishing a high capacity communication
system. Without needing to increase the transmitted power or the channel bandwidth, gain in capacity can
be considerably improved by varying the number of antennas on both sides. Correlated and uncorrelated
channels MIMO system was considered in this paper for different number of antennas and different SNR
over Rayleigh fading channel. At the transmitter both CSI(channel state information) technique and Water
filling power allocation principle was also considered in this paper.
Enabling full-duplex in multiple access technique for 5G wireless networks ov...TELKOMNIKA JOURNAL
Nowadays, unmanned aerial vehicle (UAV) relays’assisted Internet of Things (IoT) systems provide facility in order to overcome the large scale fading between source and sink. The full-duplex scheme enables wireless network to provide higher spectrum efficient technology. This paper analyses performance of two users which are served by new emerging non-orthogonal multiple access (NOMA) technique. Exact outage probability of such two users are derived and checked via Monte-Carlo simulation. These analytical results provide guideline to design UAV in real application. This paper provides a comprehensive study to examine impact of interference, fixed power allocation factors to system performance.
In this paper, we design a secure transmission scheme in uplink and downlink of nonorthogonal
multiple access (NOMA) system. In this scenario, two pairs of base stationuser can operate under the presence of eavesdropper. The relay plays an important role to forward signals from group of base stations to serve distant users. However, the eavesdropper can overhear signal which leads to secure performance need be reconsidered. To provide secure performance, we derive the closed-form expressions for strictly positive secrecy capacity (SPSC). In addition, we rely on relay for enlarge coverage area. The channel conditions meet imperfect channel state information (CSI) which shows degraded secure performance. Results confirm the relationship between transmit power at the source and and SPSC how many main parameters affecting secure
performance metric. Furthermore, simulation results show that the uplink and downlink NOMA technique improves secure performance in the low SPSC region. We further conduct analysis by using Monte-Carlo simulations.
Telecommunication System Engineering NotesHaris Hassan
Telecommunications engineering, or telecoms engineering, is an engineering discipline centered on electrical and computer engineering which seeks to support and enhance telecommunication systems.
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...journalBEEI
Non-orthogonal multiple access (NOMA) with advantages such as superior spectral efficiency has been considered as a promising multiple access technique for the fifth-generation (5G) mobile networks. In this research, we propose energy harvesting (EH) NOMA system relaying network over Rayleigh fading channel using selection combining at the receiver. Firstly, we investigate the system performance in terms of the closed-form expression of the outage probability (OP). Here we compare the OP of two destination users of the proposed system. Finally, all the results is convinced by the Monte Carlo simulation. From the results, we can confirm that all the analytical and simulation results are the same in connection with the primary system parameters.
BER Performance of MU-MIMO System using Dirty Paper CodingIJEEE
In this paper Dirty Paper Coding for communication system is implemented. MIMO application that involves devices such as cell phones, pocket PCs require closely spaced antenna, which suffers from mutual coupling among antennas and high spatial correlation for signals. DPC is used for compensating the degradation due to correlation and mutual coupling.
Study on outage performance gap of two destinations on CR-NOMA networkTELKOMNIKA JOURNAL
Non-orthogonal multiple access (NOMA) and cognitive radio (CR) are promising to overcome spectral scarcity problem encountered in applications implementations in wireless communication. Especially, massive connectivity in such network is strict requirement in network deployment. This study aims to improve spectral efficiency at two secondary destinations by investigating a CR-NOMA network under situation of the perfect successive interference cancellation (SIC). We also derive the exact outage probability for secondary users. Furthermore, an approximate computation method is applied to indicate more insights. It is confirmed that the performance achieved together with performance gap among two users can be obtained due to different power allocation factors assigned to users.
Performance of MMSE Denoise Signal Using LS-MMSE TechniqueIJMER
This paper presents performance of mmse denoises signal using consistent cycle spinning (ccs) and least square (LS) techniques. In the past decade, TV denoise technique is used to reduced the noisy signal. The main drawback is the low quality signal and high MMSE signal. Presently, we
proposed the CCS-MMSE and LS-MMSE technique .The CCS-MMSE technique consists of two steps. They are wavelet based denoise and consistent cycle spinning. The wavelet denoise is powerful decorrelating effect on many signal domains. The consistent cycle spinning is used to estimation the
MMSE in the signal domain. The LS-MMSE is better estimation of MMSE signal domain compare to
CCS-MMSE.The experimental result shows the average MMSE reduction using various techniques.
Performance of cognitive radio networks with maximal ratio combining over cor...Polytechnique Montreal
In this paper, we apply the maximal ratio combining (MRC) technique to achieve higher detection probability in cognitive radio networks over correlated Rayleigh fading channels. We present a simple approach to derive the probability of detection in closed-form expression. The numerical results reveal that the detection performance is a monotonically increasing function with respect to the number of antennas. Moreover, we provide sets of complementary receiver operating characteristic (ROC) curves to illustrate the effect of antenna correlation on the sensing performance of cognitive radio networks employing MRC schemes in some respective scenarios.
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELIJCSES Journal
High transmission data rate, spectral efficiency and reliability are essential for future wireless
communications systems. MIMO (multi-input multi-output) diversity technique is a band width efficient
system achieving high data transmission which eventually establishing a high capacity communication
system. Without needing to increase the transmitted power or the channel bandwidth, gain in capacity can
be considerably improved by varying the number of antennas on both sides. Correlated and uncorrelated
channels MIMO system was considered in this paper for different number of antennas and different SNR
over Rayleigh fading channel. At the transmitter both CSI(channel state information) technique and Water
filling power allocation principle was also considered in this paper.
Enabling full-duplex in multiple access technique for 5G wireless networks ov...TELKOMNIKA JOURNAL
Nowadays, unmanned aerial vehicle (UAV) relays’assisted Internet of Things (IoT) systems provide facility in order to overcome the large scale fading between source and sink. The full-duplex scheme enables wireless network to provide higher spectrum efficient technology. This paper analyses performance of two users which are served by new emerging non-orthogonal multiple access (NOMA) technique. Exact outage probability of such two users are derived and checked via Monte-Carlo simulation. These analytical results provide guideline to design UAV in real application. This paper provides a comprehensive study to examine impact of interference, fixed power allocation factors to system performance.
In this paper, we design a secure transmission scheme in uplink and downlink of nonorthogonal
multiple access (NOMA) system. In this scenario, two pairs of base stationuser can operate under the presence of eavesdropper. The relay plays an important role to forward signals from group of base stations to serve distant users. However, the eavesdropper can overhear signal which leads to secure performance need be reconsidered. To provide secure performance, we derive the closed-form expressions for strictly positive secrecy capacity (SPSC). In addition, we rely on relay for enlarge coverage area. The channel conditions meet imperfect channel state information (CSI) which shows degraded secure performance. Results confirm the relationship between transmit power at the source and and SPSC how many main parameters affecting secure
performance metric. Furthermore, simulation results show that the uplink and downlink NOMA technique improves secure performance in the low SPSC region. We further conduct analysis by using Monte-Carlo simulations.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Outage performance users located outside D2D coverage area in downlink cellul...journalBEEI
Device-to-device (D2D) communication has been proposed to employ the proximity between two devices to enhance the overall spectrum utilization of a crowded cellular network. With the help of geometric probability tools, this framework considers the performance of cellular users under spatial separation with the D2D pair is investigated. The measurement results and analytical expression of outage probability show that the proposed frameworks improve the outage performance at a high signal-tonoise ratio (SNR) at the base station. Results also interpret that the distances between nodes in the D2D-assisted network make slight impacts on the performance of the cellular user.
Secure outage probability of cognitive radio network relying non-orthogonal m...journalBEEI
This paper studies the secondary network relying relay selection to transmit signal from the secondary source (base station) to two destinations. Especially, two destinations are required non-orthogonal multiple access (NOMA) scheme and it benefits to implementation of the Internet of Things (IoT) systems. However, eavesdropper over-hears signal related link from selected relay to destination. This paper measure secure performance via metric, namely secure outage probability (SOP). In particular, signal to noise ratio (SNR) criterion is used to evalute SOP to provide reliable transmission to the terminal node. Main results indicates that the considered scheme provides performance gap among two signals at destination. The exactness of derived expressions is confirmed via numerical simulation.
System Consideration, Design and Implementation of Point To Point Microwave L...ijtsrd
Microwave technology is extremely used for point to point communications because it is more easily focused into narrower beams than radio waves, allowing frequency use, it is available higher data transmission rates and antenna sizes are smaller than at lower frequencies. The main aim of this system is to provide internet access for rural area using ePMP Force 180 5GHz subscriber module. The two sites are 1.45 km away from each other. GPS is used to determine the latitude and longitude of two sites location. Google Earth Pro software is used to check for line of sight in choosing potential terminal site locations. In this system, system consideration, design and analysis of line of sight microwave link and hardware implementations are to be carried out. In the analysis, path profile, Fresnel zone, link budget and other parameters are implemented using the link planner software Lay Nandar Soe | Kyaw Thet Zaw | Wai Phyo Aung "System Consideration, Design and Implementation of Point-To-Point Microwave Link for Internet Access" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26769.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/26769/system-consideration-design-and-implementation-of-point-to-point-microwave-link-for-internet-access/lay-nandar-soe
V2X communication system with non-orthogonal multiple access: outage performa...nooriasukmaningtyas
To achieve low-latency and high-reliability (LLHR) for applications in the vehicleto-everything (V2X) networks, the non-orthogonal multiple access (NOMA) is proposed for Long Term Evolution (LTE)as a promising technology. NOMA-V2X provides higher spectrum efficiency compared with the orthogonal multiple access (OMA)
based V2X. The vehicles are expected to serve different services with variety of data
transmission. The cluster of vehicles could be grouped to achieve better service from
the transmitter sources. This study presents two-way relay assisted NOMA-V2X transmission by exploiting amplify-and-forward (AF) and full-duplex technique. We can
benefits from potential applications of NOMA-V2X system with respect to serving
massive users and adapting higher bandwidth efficiency. We derive expressions of
outage probability to evaluate performance of two vehicles and to improve the quality
of service (QoS) for the device with the poor channel conditions. The main investigation related two users’ performance which provides guidelines to design practical
system. These expressions are further verified by Monte-Carlo simulations.
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...IJCNCJournal
Transmitter range assignment in clustered wireless networks is the bottleneck of the balance between
energy conservation and the connectivity to deliver data to the sink or gateway node. The aim of this
research is to optimize the energy consumption through reducing the transmission ranges of the nodes,
while maintaining high probability to have end-to-end connectivity to the network’s data sink. We modified
the approach given in [1] to achieve more than 25% power saving through reducing cluster head (CH)
transmission range of the backbone nodes in a multihop wireless sensor network with ensuring at least
95% end-to-end connectivity probability.
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMATELKOMNIKA JOURNAL
In this paper, new radio access scheme that combines Amplify-and-Forward (AF) relaying protocol and non-orthogonal multiple access (NOMA) system is introduced. In particular, different scenarios for fixed power allocation scheme is investigated. In addition, the outage probability of both weak and strong user is derived and provided in closed-form expressions. Such outage is investigated in high SNR scenario and comparison performance between these NOMA scenarios is introduced. Numerical simulations are offered to clarify the outage performance of the considered scheme if varying several parameters in the existing schemes to verify the derived formulas.
On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...TELKOMNIKA JOURNAL
In this study, to reduce the average symbol error rate, and improve coverage and reliability of unmanned aerial vehicles (UAVs) to ground communication systems. In this case, we propose a reconfigurable intelligent surfaces (RISs) assisted for UAV to ground communication scheme, where radio frequency (RF) signal generator sends an unmodulated carrier signal from UAVs to the RIS. At reconfigurable intelligent surface, the RIS modulates each signal, and RIS is as a signal generator. We carry out a performance analysis of UAV-to-ground communication systems with RIS-assisted and without RIS for subcarrier quadrature amplitude modulation (SC-QAM) technique. The analytical expressions of average symbol error rare (ASER) and average channel capacity (ACC) is derived. From the results, it is show that with RIS assisted can effectively improve the reliability and coverage of the UAVs to ground communication systems.
Studying strictly positive secure capacity in cognitive radio-based non-ortho...journalBEEI
This paper studies a downlink security-aware secure outage performance in the secondary network of cognitive radio-assisted non-orthogonal multiple access network (CR-NOMA). The multiple relay is employed to assist transmission from the secondary source to destinations. The security-aware performance is subject to constraints in fixed power allocation factor assigned to each secondary user. The security-aware secure performance is based on channel state information (CSI) at the physical layer in which an eavesdropper intends to steal information. According to the considered system, exact expressions of Strictly positive secure capacity (SPSC) are proved to analyze system in terms of secure performance. Finally, the secondary user secure problem is evaluated via Monte-Carlo simulation method. The main results indicate that the secure performance of proposed system can be improved significantly.
A new look on CSI imperfection in downlink NOMA systemsjournalBEEI
Observing that cooperative scheme benefits to non-orthogonal multiple access (NOMA) systems, we focus on system performance analysis of downlink. However, spectrum efficiency is still high priority to be addressed in existing systems and hence this paper presents full-duplex enabling in NOMA systems. Other challenge needs be considered related to channel state information (CSI). In particular, we derive closedform expressions of outage probability for such NOMA systems under the presence of CSI imperfection. Furthermore, to fully exploit practical environment, we provide system model associated with Nakagami-m fading. The Monte-Carlo simulations are conducted to verify the exactness of considered systems.
A low complexity distributed differential scheme based on orthogonal space t...IJECEIAES
This work proposes a new differential cooperative diversity scheme with high data rate and low decoding complexity using the decode-and-forward protocol. The proposed model does not require either differential encoding or channel state information at the source node, relay nodes, or destination node where the data sequence is directly transmitted and the differential detection method is applied at the relay nodes and the destination node. The proposed technique enjoys a low encoding and decoding complexity at the source node, the relay nodes, and the destination node. Furthermore, the performance of the proposed strategy is analyzed by computer simulations in quasi-static Rayleigh fading channel and using the decode-and-forward protocol. The simulation results show that the proposed differential technique outperforms the corresponding reference strategies.
Investigation on energy harvesting enabled device-to-device networks in prese...TELKOMNIKA JOURNAL
Energy harvesting from ambient radio-frequency (RF) sources has been a novel approach for extending the lifetime of wireless networks. In this paper, a cooperative device-to-device (D2D) system with the aid of energy-constrained relay is considered. The relays are assumed to be able to harvest energy from information signal and co-channel interference (CCI) signals broadcasted by nearby traditional cellular users and forward the source’s signal to its desired destination (D2D user) utilizing amplify-andforward (AF) relaying protocol. Time switching protocol (TSR) and power splitting protocol (PSR) are proposed to assist energy harvesting and information processing at the relay. The proposed approaches are applied in a model with three nodes including the source (D2D user), the relay and the destination (D2D user), the system throughput is investigated in terms of the ergodic capacity and the outage capacity, where the analytical results are obtained approximately. Our numerical results verify the our derivations, and also points out the impact of CCI on system performance. Finally, this investigation provide fundamental design guidelines for selecting hardware of energy harvesting circuits that satisfies the requirements of a practical cooperative D2D system.
Outage performance analysis of non-orthogonal multiple access systems with RF...IJECEIAES
Non-orthogonal multiple access (NOMA) has drawn enormous attention from the research community as a promising technology for future wireless communications with increasing demands of capacity and throughput. Especially, in the light of fifth-generation (5G) communication where multiple internet-of-things (IoT) devices are connected, the application of NOMA to indoor wireless networks has become more interesting to study. In view of this, we investigate the NOMA technique in energy harvesting (EH) half-duplex (HD) decode-and-forward (DF) power-splitting relaying (PSR) networks over indoor scenarios which are characterized by log-normal fading channels. The system performance of such networks is evaluated in terms of outage probability (OP) and total throughput for delay-limited transmission mode whose expressions are derived herein. In general, we can see in details how different system parameters affect such networks thanks to the results from Monte Carlo simulations. For illustrating the accuracy of our analytical results, we plot them along with the theoretical ones for comparison.
Performance enhancement of wireless sensor network by using non-orthogonal mu...nooriasukmaningtyas
In this paper, we investigate a relaying wireless sensor network (WSN) with
the non-orthogonal multiple access (NOMA) and sensor node selection
schemes over rayleigh fading. Precisely, the system consists of two sensor
clusters, a sink node, and an amplify-and-forward (AF) relay. These sensors
applying the NOMA and sensor node selection schemes transmit the sensing
data from the sensor clusters via the relay to the sink. We derived the
expressions of outage probability and throughput for two sensor nodes. We
also provide numerical results to examine the behavior of the system. Finally,
we verify the validity of our analysis by using the monte-carlo simulation.
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
Deep neural networks have accomplished enormous progress in tackling many problems. More specifically, convolutional neural network (CNN) is a category of deep networks that have been a dominant technique in computer vision tasks. Despite that these deep neural networks are highly effective; the ideal structure is still an issue that needs a lot of investigation. Deep Convolutional Neural Network model is usually designed manually by trials and repeated tests which enormously constrain its application. Many hyper-parameters of the CNN can affect the model performance. These parameters are depth of the network, numbers of convolutional layers, and numbers of kernels with their sizes. Therefore, it may be a huge challenge to design an appropriate CNN model that uses optimized hyper-parameters and reduces the reliance on manual involvement and domain expertise. In this paper, a design architecture method for CNNs is proposed by utilization of particle swarm optimization (PSO) algorithm to learn the optimal CNN hyper-parameters values. In the experiment, we used Modified National Institute of Standards and Technology (MNIST) database of handwritten digit recognition. The experiments showed that our proposed approach can find an architecture that is competitive to the state-of-the-art models with a testing error of 0.87%.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
One way to prevent and reduce the spread of the covid-19 pandemic is through physical distancing program. This research aims to develop a prototype contactless transaction system using digital payment mechanisms and QR code technology that will be applied in traditional markets. The method used in the development of electronic market systems is a prototype approach. The application of QR code and digital payments are used as a solution to minimize money exchange contacts that are common in traditional markets. The results showed that the system built was able to accelerate and facilitate the buying and selling transaction process in traditional market environment. Alpha testing shows that all functional systems are running well. Meanwhile, beta testing shows that the user can very well accept the system that was built. The results of the study also show acceptance of the usefulness of the system being built, as well as the optimism of its users to be able to take advantage of this system both technologically and functionally, so its can be a part of the digital transformation of the traditional market to the electronic market and has become one of the solutions in reducing the spread of the current covid-19 pandemic.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
A double-layer loaded on the octagon microstrip yagi antenna (OMYA) at 5.8 GHz industrial, scientific and medical (ISM) Band is investigated in this paper. The double-layer consist of two double positive (DPS) substrates. The OMYA is overlaid with a double-layer configuration were simulated, fabricated and measured. A good agreement was observed between the computed and measured results of the gain for this antenna. According to comparison results, it shows that 2.5 dB improvement of the OMYA gain can be obtained by applying the double-layer on the top of the OMYA. Meanwhile, the bandwidth of the measured OMYA with the double-layer is 14.6%. It indicates that the double-layer can be used to increase the OMYA performance in term of gain and bandwidth.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
Given the massive potentials of 5G communication networks and their foreseeable evolution, what should there be in 6G that is not in 5G or its long-term evolution? 6G communication networks are estimated to integrate the terrestrial, aerial, and maritime communications into a forceful network which would be faster, more reliable, and can support a massive number of devices with ultra-low latency requirements. This article presents a complete overview of potential 6G communication networks. The major contribution of this study is to present a broad overview of key performance indicators (KPIs) of 6G networks that cover the latest manufacturing progress in the environment of the principal areas of research application, and challenges.
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
A multi-task learning based hybrid prediction algorithm for privacy preservin...journalBEEI
There is ever increasing need to use computer vision devices to capture videos as part of many real-world applications. However, invading privacy of people is the cause of concern. There is need for protecting privacy of people while videos are used purposefully based on objective functions. One such use case is human activity recognition without disclosing human identity. In this paper, we proposed a multi-task learning based hybrid prediction algorithm (MTL-HPA) towards realising privacy preserving human activity recognition framework (PPHARF). It serves the purpose by recognizing human activities from videos while preserving identity of humans present in the multimedia object. Face of any person in the video is anonymized to preserve privacy while the actions of the person are exposed to get them extracted. Without losing utility of human activity recognition, anonymization is achieved. Humans and face detection methods file to reveal identity of the persons in video. We experimentally confirm with joint-annotated human motion data base (JHMDB) and daily action localization in YouTube (DALY) datasets that the framework recognises human activities and ensures non-disclosure of privacy information. Our approach is better than many traditional anonymization techniques such as noise adding, blurring, and masking.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Employing non-orthogonal multiple access scheme in UAV-based wireless networks
1. Bulletin of Electrical Engineering and Informatics
Vol. 10, No. 1, February 2021, pp. 241∼248
ISSN: 2302-9285, DOI: 10.11591/eei.v10i1.2102 r 241
Employing non-orthogonal multiple access scheme in
UAV-based wireless networks
Chi-Bao Le1
, Dinh-Thuan Do 2
1
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Vietnam
2
Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang
University, Vietnam
Article Info
Article history:
Received Oct 27, 2019
Revised Apr 3, 2020
Accepted Jun 25, 2020
Keywords:
NOMA
Outage Probability
UAV
ABSTRACT
This paper studies the two-hop transmission relying unmanned aerial vehicle (UAV)
relays which is suitable to implement in the internet of things (IoT) systems. To en-
hance system performance in order to overcome the large scale fading between the base
station (BS) and destination as well as achieve the higher spectrum efficiency, where
non-orthogonal multiple access (NOMA) strategies were typically applied for UAV
relays to implement massive connections transmission. In particular, outage proba-
bility is evaluated via signal to noise ratio (SNR) criterion so that the terminal node
can obtain reasonable performance. The derivations and analysis results showed that
the considered fixed power allocation scheme provides performance gap among two
signals at destination.The numerical simulation confirmed the exactness of derived
expressions in the UAV assisted system.
This is an open access article under the CC BY-SA license.
Corresponding Author:
Dinh-Thuan Do,
Wireless Communications Research Group,
Faculty of Electrical and Electronics Engineering,
Ton Duc Thang University, Ho Chi Minh City, Vietnam.
Email: dodinhthuan@tdtu.edu.vn
1. INTRODUCTION
Wireless communication technology has pace to adapt demand with rapid development of new tech-
niques. The decreasing cost of unmanned aerial vehicle (UAV) network together with the dramatical innovation
of UAV-based manufacturing technology provides connections as some difficulties happen. Therefore, some
applications such as weather monitoring systems, forest fire prevention technology, man-v-machine are pro-
vided by many new UAV applications appeared in the civilian market. In order to implement the UAV relay
based IoT networks, wide range of applications of UAV-based network attracts more attentions from community
of researchers [1]. Recently, to achieve throughput transmission above 10Gbps, ultra density device connection
and millisecond transmission delay, implement of 5G/B5G networks needs UAV assisted communications as
reported in [2, 3]. The network coverage expands to 3D interconnection as crucial demand for development
of the future communications and it releases the large scale fading regarding very high speed transmission.
Moreover, higher cost and difficulty in the construction of cellular stations happen and such situation leads
to solutions of the IoT network by employing the UAV relays assisted Communication. UAV-based network
benefits to infrastructure development by providing itss convenient implement and lower cost, high-altitude
assisted transmission [4, 5]. The main advantages of the UAV relay assisted communications are reducing the
obstruction from buildings, mountains and archieving the higher line of sight (LoS) transmission effect [6, 7].
Journal homepage: http://beei.org
2. 242 r ISSN: 2302-9285
Due to ability of massive connections and higher spectrum efficiency, NOMA has attracted great
research interest from both academia and industry [8–24]. Since users aware on imperfect channel state infor-
mation (CSI), the author studied the impact of imperfect CSI on the performance of NOMA in [15]. In [16],
the throughput aspects of the cognitive radio as applying NOMA techniques were discussed and compared.
2. SYSTEM MODEL
Figure 1 shows system model containing the two-hop transmission using UAV relay communication
model. Two UAV relays operate in half duplex and DF mode to signal forwarding, while separated signal is
detected at destination. The terminal IoT node receives signal from two links as shown in Figure 1. Typically,
the obstacles or blockage of urban buildings and mountains limit quality of the communication between the
base station BS and terminal node D, then the UAV relays are implemented to realize assisted communication.
The destination user needs two phases to perform its the transmission process. In the first phase, the BS
transmits mixture signal to the two UAV relay nodes R1, R2. The channels hi between the BS and the UAV
relays follow Nakagami-m distribution.
D
R1
R2
1
1
2
2
S
S
P
x
P
x
1
1
2
2
S
S
P x
P x
1
1
ˆ
R
P x
2
2
ˆ
R
P
x
BS
Figure 1. System model of UAV-assisted NOMA.
The received signal at UAV relays are given as
yi = hi
√
ϕ1PSx1 +
√
ϕ2PSx2
, i ∈ {1, 2}. (1)
The signal to noise ratio (SNR) is used to dectect x2 as
ΓR1,x2
=
ϕ2ρ |h1|
ϕ1ρ |h1| + 1
, (2)
where ρ = PS
N0
= PR
N0
is the transmit signal to noise radio (SNR).
After SIC happens, SNR is given to detect signal x1 as
ΓR1,x1 = ϕ1ρ |h1| . (3)
Similarly, SNR at R2 to detect x2 is given as
ΓR2,x2 =
ϕ2ρ |h2|
ϕ1ρ |h2| + 1
. (4)
Next, we will introduce the channel model of Ri → D link. In general, the UAV coverage is a circular
cell and the UAV is located at the vertical center. Thus, the channel vector of Ri → D link can be expressed as
Bulletin of Electr Eng Inf, Vol. 10, No. 1, February 2021 : 241 – 248
3. Bulletin of Electr Eng Inf ISSN: 2302-9285 r 243
gi = Liḡi , i ∈ {1, 2}, (5)
where the free space loss of the path Li is given by
Li =
λu
4π
q
d2
Ri
+ d2
h
, (6)
where dh and dRi
denote the height of UAV relay and the distance from the center of two UAV relay’s
to D, respectively, λu represents the wavelength.
Then, in the second phase of communication, each UAV relay forwards detected symbols to the des-
tination (uplink-NOMA) and the received signal at user is given as
yD =
p
PR (
√
ϕ1x̂1L1ḡ1 +
√
ϕ2x̂2L2ḡ2) . (7)
where PR is the normalized transmission powers at two relay’s
It can be computed SNR at user D to detect signal x2 is
ΓD,x2
=
ρϕ2L−2
2 |g2|
2
ρϕ1L−2
1 |g1|
2
+ 1
. (8)
Then, SNR at user D is calculated to detect signal x1 is
ΓD,x1
= ρϕ1L−2
1 |g1|
2
. (9)
3. PERFORMANCE ANALYSIS
3.1. Outage probability of x1
At destination, user D needs detect its signals. However, these signals are evaluated via outage proba-
bility. Such outage is defined as probability to SNR less than the pre-defined threshold SNR. We first consider
outage performance of x1 as below:
Px1 = Pr (ΓR1,x2 ε2 ∪ ΓR1,x1 ε1 ∪ ΓD,x2 ε2 ∪ ΓD,x1 ε1)
=1 − Pr (ΓR1,x2 ≥ ε2 ∪ ΓR1,x1 ≥ ε1 ∪ ΓD,x2 ≥ ε2 ∪ ΓD,x1 ≥ ε1)
=1 − Pr (|h1| ≥ χ)
| {z }
A1
Pr
|g2|
2
≥ δ|g1|
2
+ $2, |g1|
2
≥ $1
| {z }
A2
,
(10)
where ε1 = 22R1
− 1 with R1 being the target rate at D to detect x1, ε2 = 22R2
− 1 with R2 being
the target rate at D to detect x2, χ = max
ε2
ρ(ϕ2−ε2ϕ1) , ε1
ϕ1ρ
, δ =
ε2ϕ1L−2
1
ϕ2L−2
2
, $1 = ε1
ρϕ1L−2
1
and $2 = ε2
ρϕ2L−2
2
Let Zi =
n
|hi|
2
, |gi|
2
o
, i ∈ {1, 2} and we set, The CDFs and PDFs of Z
FZi (x) = 1 − e−µzi
x
mzi
−1
X
s=0
µs
zi
xs
s!
, (11)
and
fZi (x) =
µ
mZi
Zi
xmZi
−1
e−µZi
x
Γ (mZi )
, (12)
Employing non-orthogonal multiple access scheme in UAV-based wireless networks (Chi-Bao Le)
4. 244 r ISSN: 2302-9285
where µzi =
mzi
λzi
A1 = Pr (|h1| ≥ χ)
=1 − F|h1| (χ)
=e−µh1
χ
mh1
−1
X
a=0
µa
h1
χa
a!
.
(13)
Then, A2 is given by
A2 = Pr
|g2|
2
≥ δ|g1|
2
+ $2, |g1|
2
≥ $1
=
∞
Z
$1
f|g1|2 (x)
h
1 − F|g2|2 (δx + $2)
i
dx
=
mg2 −1
X
d=0
µd
g2
µ
mg1
g1 e−µg2
$2
d!Γ (mg1 )
∞
Z
$1
xmg1
−1
e−x(µg1 +µg2 δ)(δx + $2)
d
dx
=
mg2 −1
X
d=0
d
X
t=0
d
t
µd
g2
µ
mg1
g1 $d−t
2 δt
e−µg2
$2
d!Γ (mg1 )
∞
Z
$1
xmg1
+t−1
e−x(µg1 +µg2 δ)dx.
(14)
Applying [[23], (3.351.2)], A2 is given by
A2 =
mg2
−1
X
d=0
d
X
t=0
mg1
+t−1
X
k=0
d
t
µd
g2
µ
mg1
g1 $d−t
2 δt
Γ (mg1
+ t) $k
1 e−µg2
$2−$1(µg1
+µg2
δ)
d!k!Γ (mg1
) (µg1
+ µg2
δ)
mg1
+t−k
(15)
where Γ (x) = (x − 1)! is the gamma function. Next, substituting (15) and (13) into (10), Px1 is
expressed by
Px1
=1 − e−µh1
χ
mh1
−1
X
a=0
mg2
−1
X
d=0
d
X
t=0
mg1
+t−1
X
k=0
d
t
µd
g2
µ
mg1
g1 µa
h1
χa
$d−t
2 δt
Γ (mg1 + t) $k
1
a!d!k!Γ (mg1 )
×
e−µg2
$2−$1(µg1
+µg2
δ)
(µg1
+ µg2
δ)
mg1
+t−k
.
(16)
When ρ → ∞, by using e−x
≈ 1 − x so the asymptotic of P∞
x1
is formulated by
P∞
x1
=1 − (1 − µh1
χ)
mh1
−1
X
a=0
mg2
−1
X
d=0
d
X
t=0
mg1
+t−1
X
k=0
d
t
µd
g2
µ
mg1
g1 µa
h1
χa
$d−t
2 δt
Γ (mg1
+ t) $k
1
a!d!k!Γ (mg1
)
×
[1 − µg2 $2 − $1 (µg1 + µg2 δ)]
(µg1
+ µg2
δ)
mg1
+t−k
.
(17)
According to (8), we have lim
ρ→∞
ΓD,x2
=
ϕ2L−2
2 |g2|2
ϕ1L−2
1 |g1|2 the approximate of Papp.
x1
and Papp.
x2
are given by
Papp.
x1
= Papp.
x2
=
mg2
−1
X
d=0
µd
g2
µ
mg1
g1 δd
Γ (mg1 + d)
d!Γ (mg1
) (µg1
+ µg2
δ)
mg1
+d
. (18)
Bulletin of Electr Eng Inf, Vol. 10, No. 1, February 2021 : 241 – 248
5. Bulletin of Electr Eng Inf ISSN: 2302-9285 r 245
3.2. Outage probability of x2
Similarly, outage performance of x2 can be formulated by
Px2
= Pr (ΓR2,x2
ε2 ∪ ΓD,x2
ε2)
=1 − Pr (ΓR2,x2
≥ ε2, ΓD,x2
≥ ε2)
=1 − Pr (|h2| ≥ ν)
| {z }
B1
Pr
|g2|
2
≥ δ|g1|
2
+ $2
| {z }
B2
,
(19)
where ν = ε2
ρ(ϕ2−ε2ϕ1)
We need compute each outage component as
B1 = Pr (|h2| ≥ ν)
=1 − F|h2| (ν)
=e−µh2
ν
mh2
−1
X
b=0
µb
h2
νb
b!
.
(20)
Then, we continue to compute the second term as
B2 = Pr
|g2|
2
≥ δ|g1|
2
+ $2
=
∞
Z
0
f|g1|2 (x)
h
1 − F|g2|2 (δx + $2)
i
dx
=
mg2
−1
X
d=0
d
X
t=0
d
t
µd
g2
µ
mg1
g1 δt
$d−t
2 e−µg2 $2
d!Γ (mg1
)
∞
Z
0
xmg1
+t−1
e−x(µg1
+µg2
δ)dx.
(21)
Based on [[17], (3.351.3)], B2 is given by
B2 =
mg2 −1
X
d=0
d
X
t=0
d
t
µd
g2
µ
mg1
g1 δt
$d−t
2 Γ (mg1 + t) e−µg2
$2
d!Γ (mg1
) (µg1
+ µg2
δ)
mg1
+t . (22)
Substituting (22) and (20) into (19), Px2
is given by
Px2
= 1 − e−µh2
ν
mh2
−1
X
b=0
mg2
−1
X
d=0
d
X
t=0
d
t
µb
h2
νb
µd
g2
µ
mg1
g1 δt
$d−t
2 Γ (mg1 + t) e−µg2
$2
b!d!Γ (mg1
) (µg1
+ µg2
δ)
mg1
+t . (23)
Corresponding to formula (17) the asymptotic of P∞
x2
is given by
P∞
x2
= 1 − (1 − µh2 ν)
mh2
−1
X
b=0
mg2
−1
X
d=0
d
X
t=0
d
t
µb
h2
νb
µd
g2
µ
mg1
g1 δt
$d−t
2 Γ (mg1
+ t) (1 − µg2
$2)
b!d!Γ (mg1 ) (µg1 + µg2 δ)
mg1 +t . (24)
4. NUMERICAL RESULTS
We set fading parameter m = mh1
= mh2
= mg1
= mg2
= 2 and channel gains as λ = λh1
=
λh2 = λg1 = λg2 = 1. The power allocation coefficients of NOMA’s users are ϕ1 = 0.1 and ϕ1 = 0.9.
The target rates are R1 and R2 and they are set to be R1 = R2 = 0.5. The times of Monte Carlo simulation
107
. The height of UAV dh = 300 m. The distance between R1 → D and R2 → D are dR1D = 200 m and
dR1D = 100 m, respectively.
Employing non-orthogonal multiple access scheme in UAV-based wireless networks (Chi-Bao Le)
6. 246 r ISSN: 2302-9285
Figure 2 shows outage performance versus transmit SNR. We consider four cases of m. As can be
seen from such outage performance, asymptotic curves are very matched with exact curves. Signal x2 exhibits
better outage probability compared with x1 since different power allocated to each signal. The simulation
results are also very tight with the analytical results. m = 4 is considered as the best case among these curves.
Figure 3 confirms that NOMA benefits to outage performance of signal x2 as it is better than OMA
method. Figure 4 indicates the optimal outage for signal x1 and it happens at ϕ1 = 0.25. Higher threshold
SNR results in worse outage performance of two signals as observation from Figure 5.
0 5 10 15 20 25 30 35
10-3
10-2
10
-1
10
0
Outage
Probability
m = 1
m = 2
m = 3
m = 4
Figure 2. Outage performance of x1 and x2
versus transmit SNR
0 5 10 15 20 25 30 35
10-3
10-2
10
-1
10
0
Outage
Probability
m = 4
m = 1
Figure 3. Comparison between OMA and
NOMA
0 5 10 15 20 25 30 35
10-3
10-2
10
-1
100
Outage
Probability
m = 1
m = 2
m = 3
m = 4
Figure 4. Outage performance versus ϕ1, with
ρ = 10dB
0 5 10 15 20 25 30 35
10-3
10-2
10
-1
100
Outage
Probability
m = 4
m = 1
Figure 5. Outage performance versus threshold
rates, with ϕ1 = 0.05, ϕ2 = 1.95 and ρ = 20dB
5. CONCLUSION
The paper proposed IoT system relying UAV relay to enhance performance of destination. This tech-
nique effectively overcomes the large scale fading between the BS and far user. Moreover, the proposed NOMA
strategy was typically applied for UAV relays and achieved acceptable outage performance. Meanwhile, the
outage probability and throughput closed-form expressions were derived. The derivations and analysis results
showed that the proposed multiple parameters joint consideration can effectively improve the system through-
put and reduce the system outage probability.
Bulletin of Electr Eng Inf, Vol. 10, No. 1, February 2021 : 241 – 248
7. Bulletin of Electr Eng Inf ISSN: 2302-9285 r 247
APENDIX
By invoking (15) into (19), it can be expressed the outage probability as
OPDF
U1
= Pr
|hSR|
2
γth1
|hRU1 |
2
+1
(a1−γth1a2)ρ|hRU1 |
2
(25)
Based on probability density function (PDF) of |hi|
2
is given as f|hi|2 (x) = λRU1
e−λRU1
x
, it can be
rewritten as
OPDF
U1
=
∞
R
0
f|hRU1 |
2 (x)
∞
R
γth1(x+1)
(a1−γth1a2)ρx
f|hRU1 |
2 (y)dxdy
=
∞
R
0
1 − e
−
γth1(x+1)
(a1−γth1a2)ρx
λRU1
e−λRU1
x
dx
(26)
Thus, based on [25, 3.324.1] OPDF
U1
can be obtained as
OPDF
U1
=
∞
R
0
1 − e
−
γth1(x+1)
(a1−γth1a2)ρx
λRU1 e−λRU1
x
dx
= 1 − 2e
−
λSRγth1
(a1−γth1a2)ρ
q
γth1λSRλRU1
(a1−γth1a2)ρ K1
2
q
γth1λRU1
λSR
(a1−γth1a2)ρ
(27)
It is end of the proof.
ACKNOWLEDGEMENT
The acknowledgment section is optional. The funding source of the research can be put here.
REFERENCES
[1] Y. Zeng, R. Zhang, and T. J. Lim, ”Wireless communications with unmanned aerial vehicles: Opportuni-
ties and challenges,” IEEE Commun. Mag., vol. 54, no. 5, pp. 36-42, May 2016.
[2] A. Osseiran et al., ”Scenarios for 5G mobile and wireless communications: The vision of the METIS
project,” IEEE Commun. Mag., vol. 52, no. 5, pp. 26-35, May 2014.
[3] B. Ji, Y. Wang, B. Xing, Y. Wang, K. Song, C. Li, and R. Zhao, ”Efficient protocol design for device-
to-device communication in ultra dense networks,” Presented at the Int. Symp. Intell. Signal Process.
Commun. Syst. (ISPACS), 2017.
[4] L. Gupta, R. Jain, and G. Vaszkun, ”Survey of important issues in UAV communication networks,” IEEE
Commun. Surveys Tuts., vol. 18, no. 2, pp. 1123-1152, 2nd Quart., 2015.
[5] M. Hua, Y. Wang, Z. Zhang, C. Li, Y. Huang, and L. Yang, ”Power-efficient communication in UAV-aided
wireless sensor networks,” IEEE Commun. Lett., vol. 22, no. 6, pp. 1264-1267, Jun. 2018.
[6] Y. Zeng and R. Zhang, ”Energy-efficient UAV communication with trajectory optimization,” IEEE Trans.
Wireless Commun., vol. 16, no. 6, pp. 3747-3760, Jun. 2017.
[7] C. Li, P. Liu, C. Zou, F. Sun, J. M. Cioffi, and L. Yang, ”Spectral-efficient cellular communications with
coexistent one- and two-hop transmissions,” IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6765-6772,
Aug. 2016.
[8] Dinh-Thuan Do and M.-S. Van Nguyen, ”Device-to-device transmission modes in NOMA network with
and without Wireless Power Transfer,” Computer Communications, vol. 139, pp. 67-77, May 2019.
[9] D.-T. Do and A.-T. Le, ”NOMA based cognitive relaying: Transceiver hardware impairments, relay se-
lection policies and outage performance comparison,” Computer Communications, vol. 146, pp. 144-154,
2019.
[10] D.-T. Do, A.-T. Le and B.-M. Lee, ”On Performance Analysis of Underlay Cognitive Radio-Aware Hybrid
OMA/NOMA Networks with Imperfect CSI,” Electronics, vol. 8, no. 7, 2019.
[11] Dinh-Thuan Do and C.-B. Le, ”Application of NOMA in Wireless System with Wireless Power Transfer
Scheme: Outage and Ergodic Capacity Performance Analysis,” Sensors, vol. 18, no. 10, 2018.
[12] T.-L. Nguyen and Dinh-Thuan Do, ”Exploiting Impacts of Intercell Interference on SWIPT-assisted Non-
orthogonal Multiple Access,” Wireless Communications and Mobile Computing, vol. 2018, 2018.
Employing non-orthogonal multiple access scheme in UAV-based wireless networks (Chi-Bao Le)
8. 248 r ISSN: 2302-9285
[13] D-T. Do et al. ”Wireless power transfer enabled NOMA relay systems: two SIC modes and performance
evaluation,” TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 17, no. 6, pp.
2697-2703, 2019.
[14] Dinh-Thuan Do, Chi-Bao Le, A.-T. Le, ”Cooperative underlay cognitive radio assisted NOMA: secondary
network improvement and outage performance,” TELKOMNIKA Telecommunication, Computing, Elec-
tronics and Control, vol. 17, no. 5, pp. 2147-2154, 2019.
[15] D.-T. Do, M. Vaezi and T.-L. Nguyen, ”Wireless Powered Cooperative Relaying using NOMA with Im-
perfect CSI,” Proc. of IEEE Globecom Workshops (GC Wkshps), pp. 1-6, 2018.
[16] D.-T. Do, A.-T. Le, C.-B. Le and B. M. Lee, ”On Exact Outage and Throughput Performance of Cognitive
Radio based Non-Orthogonal Multiple Access Networks With and Without D2D Link,” Sensors (Basel),
vol. 19, no. 15, 2019.
[17] X. Li, J. Li, Y. Liu, Z. Ding and A. Nallanathan, ”Residual Transceiver Hardware Impairments on Coop-
erative NOMA Networks,” IEEE Transactions on Wireless Communications, vol. 19, no. 1, pp. 680-695,
Jan. 2020.
[18] X. Li, J. Li and L. Li, ”Performance Analysis of Impaired SWIPT NOMA Relaying Networks Over
Imperfect Weibull Channels,” IEEE Systems Journal, vol. 14, no. 1, pp. 669-672, March 2020.
[19] X. Li, M. Liu, C. Deng, P. T. Mathiopoulos, Z. Ding and Y. Liu, ”Full-Duplex Cooperative NOMA
Relaying Systems With I/Q Imbalance and Imperfect SIC,” IEEE Wireless Communications Letters, vol.
9, no. 1, pp. 17-20, Jan. 2020.
[20] X. Li, Qunshu Wang, Hongxing Peng, Hui Zhang, Dinh-Thuan Do, Khaled M. Rabie, Rupak Kharel and
Charles C. Cavalcante, “A Unified Framework for HS-UAV NOMA Network: Performance Analysis and
Location Optimization,” IEEE Access, vol. 8, pp. 13329-13340, 2020.
[21] X. Li, J. Li, L. Li, J. Jin, J. Zhang and D. Zhang, ”Effective Rate of MISO Systems Over κ − µ Shadowed
Fading Channels,” IEEE Access, vol. 5, pp. 10605-10611, 2017.
[22] X. Li, M. Liu, C. Deng, , D. Zhang, X. Gao, K. M. Rabie, R. Kharel, “Joint Effects of Residual Hardware
Impairments and Channel Estimation Errors on SWIPT Assisted Cooperative NOMA Networks,” IEEE
Access, pp.1-15, 2019.
[23] X. Li, M. Huang, C. Zhang, D. Deng, K. M Rabie, Y. Ding, and J. Du, ”Security and Reliability Perfor-
mance Analysis of Cooperative Multi-Relay Systems With Nonlinear Energy Harvesters and Hardware
Impairments,” IEEE Access, vol. 7, pp. 102644-102661, 2019.
[24] J. Li, X. Li, Y. Liu, C. Zhang, L. Li and A. Nallanathan, ”Joint Impact of Hardware Impairments and
Imperfect Channel State Information on Multi-Relay Networks,” IEEE Access, vol. 7, pp. 72358-72375,
2019.
[25] I. S. Gradshteyn and I. M. Ryzhik, ”Table of Integrals, Series and Products,” 6th ed. New York, NY, USA:
Academic Press, 2000.
Bulletin of Electr Eng Inf, Vol. 10, No. 1, February 2021 : 241 – 248