SlideShare a Scribd company logo
Bulletin of Electrical Engineering and Informatics
Vol. 10, No. 1, February 2021, pp. 241∼248
ISSN: 2302-9285, DOI: 10.11591/eei.v10i1.2102 r 241
Employing non-orthogonal multiple access scheme in
UAV-based wireless networks
Chi-Bao Le1
, Dinh-Thuan Do 2
1
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Vietnam
2
Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang
University, Vietnam
Article Info
Article history:
Received Oct 27, 2019
Revised Apr 3, 2020
Accepted Jun 25, 2020
Keywords:
NOMA
Outage Probability
UAV
ABSTRACT
This paper studies the two-hop transmission relying unmanned aerial vehicle (UAV)
relays which is suitable to implement in the internet of things (IoT) systems. To en-
hance system performance in order to overcome the large scale fading between the base
station (BS) and destination as well as achieve the higher spectrum efficiency, where
non-orthogonal multiple access (NOMA) strategies were typically applied for UAV
relays to implement massive connections transmission. In particular, outage proba-
bility is evaluated via signal to noise ratio (SNR) criterion so that the terminal node
can obtain reasonable performance. The derivations and analysis results showed that
the considered fixed power allocation scheme provides performance gap among two
signals at destination.The numerical simulation confirmed the exactness of derived
expressions in the UAV assisted system.
This is an open access article under the CC BY-SA license.
Corresponding Author:
Dinh-Thuan Do,
Wireless Communications Research Group,
Faculty of Electrical and Electronics Engineering,
Ton Duc Thang University, Ho Chi Minh City, Vietnam.
Email: dodinhthuan@tdtu.edu.vn
1. INTRODUCTION
Wireless communication technology has pace to adapt demand with rapid development of new tech-
niques. The decreasing cost of unmanned aerial vehicle (UAV) network together with the dramatical innovation
of UAV-based manufacturing technology provides connections as some difficulties happen. Therefore, some
applications such as weather monitoring systems, forest fire prevention technology, man-v-machine are pro-
vided by many new UAV applications appeared in the civilian market. In order to implement the UAV relay
based IoT networks, wide range of applications of UAV-based network attracts more attentions from community
of researchers [1]. Recently, to achieve throughput transmission above 10Gbps, ultra density device connection
and millisecond transmission delay, implement of 5G/B5G networks needs UAV assisted communications as
reported in [2, 3]. The network coverage expands to 3D interconnection as crucial demand for development
of the future communications and it releases the large scale fading regarding very high speed transmission.
Moreover, higher cost and difficulty in the construction of cellular stations happen and such situation leads
to solutions of the IoT network by employing the UAV relays assisted Communication. UAV-based network
benefits to infrastructure development by providing itss convenient implement and lower cost, high-altitude
assisted transmission [4, 5]. The main advantages of the UAV relay assisted communications are reducing the
obstruction from buildings, mountains and archieving the higher line of sight (LoS) transmission effect [6, 7].
Journal homepage: http://beei.org
242 r ISSN: 2302-9285
Due to ability of massive connections and higher spectrum efficiency, NOMA has attracted great
research interest from both academia and industry [8–24]. Since users aware on imperfect channel state infor-
mation (CSI), the author studied the impact of imperfect CSI on the performance of NOMA in [15]. In [16],
the throughput aspects of the cognitive radio as applying NOMA techniques were discussed and compared.
2. SYSTEM MODEL
Figure 1 shows system model containing the two-hop transmission using UAV relay communication
model. Two UAV relays operate in half duplex and DF mode to signal forwarding, while separated signal is
detected at destination. The terminal IoT node receives signal from two links as shown in Figure 1. Typically,
the obstacles or blockage of urban buildings and mountains limit quality of the communication between the
base station BS and terminal node D, then the UAV relays are implemented to realize assisted communication.
The destination user needs two phases to perform its the transmission process. In the first phase, the BS
transmits mixture signal to the two UAV relay nodes R1, R2. The channels hi between the BS and the UAV
relays follow Nakagami-m distribution.
D
R1
R2
1
1
2
2
S
S
P
x
P
x



1
1
2
2
S
S
P x
P x



1
1
ˆ
R
P x

2
2
ˆ
R
P
x

BS
Figure 1. System model of UAV-assisted NOMA.
The received signal at UAV relays are given as
yi = hi
√
ϕ1PSx1 +
√
ϕ2PSx2

, i ∈ {1, 2}. (1)
The signal to noise ratio (SNR) is used to dectect x2 as
ΓR1,x2
=
ϕ2ρ |h1|
ϕ1ρ |h1| + 1
, (2)
where ρ = PS
N0
= PR
N0
is the transmit signal to noise radio (SNR).
After SIC happens, SNR is given to detect signal x1 as
ΓR1,x1 = ϕ1ρ |h1| . (3)
Similarly, SNR at R2 to detect x2 is given as
ΓR2,x2 =
ϕ2ρ |h2|
ϕ1ρ |h2| + 1
. (4)
Next, we will introduce the channel model of Ri → D link. In general, the UAV coverage is a circular
cell and the UAV is located at the vertical center. Thus, the channel vector of Ri → D link can be expressed as
Bulletin of Electr Eng  Inf, Vol. 10, No. 1, February 2021 : 241 – 248
Bulletin of Electr Eng  Inf ISSN: 2302-9285 r 243
gi = Liḡi , i ∈ {1, 2}, (5)
where the free space loss of the path Li is given by
Li =
λu
4π
q
d2
Ri
+ d2
h
, (6)
where dh and dRi
denote the height of UAV relay and the distance from the center of two UAV relay’s
to D, respectively, λu represents the wavelength.
Then, in the second phase of communication, each UAV relay forwards detected symbols to the des-
tination (uplink-NOMA) and the received signal at user is given as
yD =
p
PR (
√
ϕ1x̂1L1ḡ1 +
√
ϕ2x̂2L2ḡ2) . (7)
where PR is the normalized transmission powers at two relay’s
It can be computed SNR at user D to detect signal x2 is
ΓD,x2
=
ρϕ2L−2
2 |g2|
2
ρϕ1L−2
1 |g1|
2
+ 1
. (8)
Then, SNR at user D is calculated to detect signal x1 is
ΓD,x1
= ρϕ1L−2
1 |g1|
2
. (9)
3. PERFORMANCE ANALYSIS
3.1. Outage probability of x1
At destination, user D needs detect its signals. However, these signals are evaluated via outage proba-
bility. Such outage is defined as probability to SNR less than the pre-defined threshold SNR. We first consider
outage performance of x1 as below:
Px1 = Pr (ΓR1,x2  ε2 ∪ ΓR1,x1  ε1 ∪ ΓD,x2  ε2 ∪ ΓD,x1  ε1)
=1 − Pr (ΓR1,x2 ≥ ε2 ∪ ΓR1,x1 ≥ ε1 ∪ ΓD,x2 ≥ ε2 ∪ ΓD,x1 ≥ ε1)
=1 − Pr (|h1| ≥ χ)
| {z }
A1
Pr

|g2|
2
≥ δ|g1|
2
+ $2, |g1|
2
≥ $1

| {z }
A2
,
(10)
where ε1 = 22R1
− 1 with R1 being the target rate at D to detect x1, ε2 = 22R2
− 1 with R2 being
the target rate at D to detect x2, χ = max

ε2
ρ(ϕ2−ε2ϕ1) , ε1
ϕ1ρ

, δ =
ε2ϕ1L−2
1
ϕ2L−2
2
, $1 = ε1
ρϕ1L−2
1
and $2 = ε2
ρϕ2L−2
2
Let Zi =
n
|hi|
2
, |gi|
2
o
, i ∈ {1, 2} and we set, The CDFs and PDFs of Z
FZi (x) = 1 − e−µzi
x
mzi
−1
X
s=0
µs
zi
xs
s!
, (11)
and
fZi (x) =
µ
mZi
Zi
xmZi
−1
e−µZi
x
Γ (mZi )
, (12)
Employing non-orthogonal multiple access scheme in UAV-based wireless networks (Chi-Bao Le)
244 r ISSN: 2302-9285
where µzi =
mzi
λzi
A1 = Pr (|h1| ≥ χ)
=1 − F|h1| (χ)
=e−µh1
χ
mh1
−1
X
a=0
µa
h1
χa
a!
.
(13)
Then, A2 is given by
A2 = Pr

|g2|
2
≥ δ|g1|
2
+ $2, |g1|
2
≥ $1

=
∞
Z
$1
f|g1|2 (x)
h
1 − F|g2|2 (δx + $2)
i
dx
=
mg2 −1
X
d=0
µd
g2
µ
mg1
g1 e−µg2
$2
d!Γ (mg1 )
∞
Z
$1
xmg1
−1
e−x(µg1 +µg2 δ)(δx + $2)
d
dx
=
mg2 −1
X
d=0
d
X
t=0

d
t

µd
g2
µ
mg1
g1 $d−t
2 δt
e−µg2
$2
d!Γ (mg1 )
∞
Z
$1
xmg1
+t−1
e−x(µg1 +µg2 δ)dx.
(14)
Applying [[23], (3.351.2)], A2 is given by
A2 =
mg2
−1
X
d=0
d
X
t=0
mg1
+t−1
X
k=0

d
t

µd
g2
µ
mg1
g1 $d−t
2 δt
Γ (mg1
+ t) $k
1 e−µg2
$2−$1(µg1
+µg2
δ)
d!k!Γ (mg1
) (µg1
+ µg2
δ)
mg1
+t−k
(15)
where Γ (x) = (x − 1)! is the gamma function. Next, substituting (15) and (13) into (10), Px1 is
expressed by
Px1
=1 − e−µh1
χ
mh1
−1
X
a=0
mg2
−1
X
d=0
d
X
t=0
mg1
+t−1
X
k=0

d
t

µd
g2
µ
mg1
g1 µa
h1
χa
$d−t
2 δt
Γ (mg1 + t) $k
1
a!d!k!Γ (mg1 )
×
e−µg2
$2−$1(µg1
+µg2
δ)
(µg1
+ µg2
δ)
mg1
+t−k
.
(16)
When ρ → ∞, by using e−x
≈ 1 − x so the asymptotic of P∞
x1
is formulated by
P∞
x1
=1 − (1 − µh1
χ)
mh1
−1
X
a=0
mg2
−1
X
d=0
d
X
t=0
mg1
+t−1
X
k=0

d
t

µd
g2
µ
mg1
g1 µa
h1
χa
$d−t
2 δt
Γ (mg1
+ t) $k
1
a!d!k!Γ (mg1
)
×
[1 − µg2 $2 − $1 (µg1 + µg2 δ)]
(µg1
+ µg2
δ)
mg1
+t−k
.
(17)
According to (8), we have lim
ρ→∞
ΓD,x2
=
ϕ2L−2
2 |g2|2
ϕ1L−2
1 |g1|2 the approximate of Papp.
x1
and Papp.
x2
are given by
Papp.
x1
= Papp.
x2
=
mg2
−1
X
d=0
µd
g2
µ
mg1
g1 δd
Γ (mg1 + d)
d!Γ (mg1
) (µg1
+ µg2
δ)
mg1
+d
. (18)
Bulletin of Electr Eng  Inf, Vol. 10, No. 1, February 2021 : 241 – 248
Bulletin of Electr Eng  Inf ISSN: 2302-9285 r 245
3.2. Outage probability of x2
Similarly, outage performance of x2 can be formulated by
Px2
= Pr (ΓR2,x2
 ε2 ∪ ΓD,x2
 ε2)
=1 − Pr (ΓR2,x2
≥ ε2, ΓD,x2
≥ ε2)
=1 − Pr (|h2| ≥ ν)
| {z }
B1
Pr

|g2|
2
≥ δ|g1|
2
+ $2

| {z }
B2
,
(19)
where ν = ε2
ρ(ϕ2−ε2ϕ1)
We need compute each outage component as
B1 = Pr (|h2| ≥ ν)
=1 − F|h2| (ν)
=e−µh2
ν
mh2
−1
X
b=0
µb
h2
νb
b!
.
(20)
Then, we continue to compute the second term as
B2 = Pr

|g2|
2
≥ δ|g1|
2
+ $2

=
∞
Z
0
f|g1|2 (x)
h
1 − F|g2|2 (δx + $2)
i
dx
=
mg2
−1
X
d=0
d
X
t=0

d
t

µd
g2
µ
mg1
g1 δt
$d−t
2 e−µg2 $2
d!Γ (mg1
)
∞
Z
0
xmg1
+t−1
e−x(µg1
+µg2
δ)dx.
(21)
Based on [[17], (3.351.3)], B2 is given by
B2 =
mg2 −1
X
d=0
d
X
t=0

d
t

µd
g2
µ
mg1
g1 δt
$d−t
2 Γ (mg1 + t) e−µg2
$2
d!Γ (mg1
) (µg1
+ µg2
δ)
mg1
+t . (22)
Substituting (22) and (20) into (19), Px2
is given by
Px2
= 1 − e−µh2
ν
mh2
−1
X
b=0
mg2
−1
X
d=0
d
X
t=0

d
t

µb
h2
νb
µd
g2
µ
mg1
g1 δt
$d−t
2 Γ (mg1 + t) e−µg2
$2
b!d!Γ (mg1
) (µg1
+ µg2
δ)
mg1
+t . (23)
Corresponding to formula (17) the asymptotic of P∞
x2
is given by
P∞
x2
= 1 − (1 − µh2 ν)
mh2
−1
X
b=0
mg2
−1
X
d=0
d
X
t=0

d
t

µb
h2
νb
µd
g2
µ
mg1
g1 δt
$d−t
2 Γ (mg1
+ t) (1 − µg2
$2)
b!d!Γ (mg1 ) (µg1 + µg2 δ)
mg1 +t . (24)
4. NUMERICAL RESULTS
We set fading parameter m = mh1
= mh2
= mg1
= mg2
= 2 and channel gains as λ = λh1
=
λh2 = λg1 = λg2 = 1. The power allocation coefficients of NOMA’s users are ϕ1 = 0.1 and ϕ1 = 0.9.
The target rates are R1 and R2 and they are set to be R1 = R2 = 0.5. The times of Monte Carlo simulation
107
. The height of UAV dh = 300 m. The distance between R1 → D and R2 → D are dR1D = 200 m and
dR1D = 100 m, respectively.
Employing non-orthogonal multiple access scheme in UAV-based wireless networks (Chi-Bao Le)
246 r ISSN: 2302-9285
Figure 2 shows outage performance versus transmit SNR. We consider four cases of m. As can be
seen from such outage performance, asymptotic curves are very matched with exact curves. Signal x2 exhibits
better outage probability compared with x1 since different power allocated to each signal. The simulation
results are also very tight with the analytical results. m = 4 is considered as the best case among these curves.
Figure 3 confirms that NOMA benefits to outage performance of signal x2 as it is better than OMA
method. Figure 4 indicates the optimal outage for signal x1 and it happens at ϕ1 = 0.25. Higher threshold
SNR results in worse outage performance of two signals as observation from Figure 5.
0 5 10 15 20 25 30 35
10-3
10-2
10
-1
10
0
Outage
Probability
m = 1
m = 2
m = 3
m = 4
Figure 2. Outage performance of x1 and x2
versus transmit SNR
0 5 10 15 20 25 30 35
10-3
10-2
10
-1
10
0
Outage
Probability
m = 4
m = 1
Figure 3. Comparison between OMA and
NOMA
0 5 10 15 20 25 30 35
10-3
10-2
10
-1
100
Outage
Probability
m = 1
m = 2
m = 3
m = 4
Figure 4. Outage performance versus ϕ1, with
ρ = 10dB
0 5 10 15 20 25 30 35
10-3
10-2
10
-1
100
Outage
Probability
m = 4
m = 1
Figure 5. Outage performance versus threshold
rates, with ϕ1 = 0.05, ϕ2 = 1.95 and ρ = 20dB
5. CONCLUSION
The paper proposed IoT system relying UAV relay to enhance performance of destination. This tech-
nique effectively overcomes the large scale fading between the BS and far user. Moreover, the proposed NOMA
strategy was typically applied for UAV relays and achieved acceptable outage performance. Meanwhile, the
outage probability and throughput closed-form expressions were derived. The derivations and analysis results
showed that the proposed multiple parameters joint consideration can effectively improve the system through-
put and reduce the system outage probability.
Bulletin of Electr Eng  Inf, Vol. 10, No. 1, February 2021 : 241 – 248
Bulletin of Electr Eng  Inf ISSN: 2302-9285 r 247
APENDIX
By invoking (15) into (19), it can be expressed the outage probability as
OPDF
U1
= Pr

|hSR|
2

γth1

|hRU1 |
2
+1

(a1−γth1a2)ρ|hRU1 |
2

(25)
Based on probability density function (PDF) of |hi|
2
is given as f|hi|2 (x) = λRU1
e−λRU1
x
, it can be
rewritten as
OPDF
U1
=
∞
R
0
f|hRU1 |
2 (x)
∞
R
γth1(x+1)
(a1−γth1a2)ρx
f|hRU1 |
2 (y)dxdy
=
∞
R
0

1 − e
−
γth1(x+1)
(a1−γth1a2)ρx

λRU1
e−λRU1
x
dx
(26)
Thus, based on [25, 3.324.1] OPDF
U1
can be obtained as
OPDF
U1
=
∞
R
0

1 − e
−
γth1(x+1)
(a1−γth1a2)ρx

λRU1 e−λRU1
x
dx
= 1 − 2e
−
λSRγth1
(a1−γth1a2)ρ
q
γth1λSRλRU1
(a1−γth1a2)ρ K1

2
q
γth1λRU1
λSR
(a1−γth1a2)ρ
 (27)
It is end of the proof.
ACKNOWLEDGEMENT
The acknowledgment section is optional. The funding source of the research can be put here.
REFERENCES
[1] Y. Zeng, R. Zhang, and T. J. Lim, ”Wireless communications with unmanned aerial vehicles: Opportuni-
ties and challenges,” IEEE Commun. Mag., vol. 54, no. 5, pp. 36-42, May 2016.
[2] A. Osseiran et al., ”Scenarios for 5G mobile and wireless communications: The vision of the METIS
project,” IEEE Commun. Mag., vol. 52, no. 5, pp. 26-35, May 2014.
[3] B. Ji, Y. Wang, B. Xing, Y. Wang, K. Song, C. Li, and R. Zhao, ”Efficient protocol design for device-
to-device communication in ultra dense networks,” Presented at the Int. Symp. Intell. Signal Process.
Commun. Syst. (ISPACS), 2017.
[4] L. Gupta, R. Jain, and G. Vaszkun, ”Survey of important issues in UAV communication networks,” IEEE
Commun. Surveys Tuts., vol. 18, no. 2, pp. 1123-1152, 2nd Quart., 2015.
[5] M. Hua, Y. Wang, Z. Zhang, C. Li, Y. Huang, and L. Yang, ”Power-efficient communication in UAV-aided
wireless sensor networks,” IEEE Commun. Lett., vol. 22, no. 6, pp. 1264-1267, Jun. 2018.
[6] Y. Zeng and R. Zhang, ”Energy-efficient UAV communication with trajectory optimization,” IEEE Trans.
Wireless Commun., vol. 16, no. 6, pp. 3747-3760, Jun. 2017.
[7] C. Li, P. Liu, C. Zou, F. Sun, J. M. Cioffi, and L. Yang, ”Spectral-efficient cellular communications with
coexistent one- and two-hop transmissions,” IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6765-6772,
Aug. 2016.
[8] Dinh-Thuan Do and M.-S. Van Nguyen, ”Device-to-device transmission modes in NOMA network with
and without Wireless Power Transfer,” Computer Communications, vol. 139, pp. 67-77, May 2019.
[9] D.-T. Do and A.-T. Le, ”NOMA based cognitive relaying: Transceiver hardware impairments, relay se-
lection policies and outage performance comparison,” Computer Communications, vol. 146, pp. 144-154,
2019.
[10] D.-T. Do, A.-T. Le and B.-M. Lee, ”On Performance Analysis of Underlay Cognitive Radio-Aware Hybrid
OMA/NOMA Networks with Imperfect CSI,” Electronics, vol. 8, no. 7, 2019.
[11] Dinh-Thuan Do and C.-B. Le, ”Application of NOMA in Wireless System with Wireless Power Transfer
Scheme: Outage and Ergodic Capacity Performance Analysis,” Sensors, vol. 18, no. 10, 2018.
[12] T.-L. Nguyen and Dinh-Thuan Do, ”Exploiting Impacts of Intercell Interference on SWIPT-assisted Non-
orthogonal Multiple Access,” Wireless Communications and Mobile Computing, vol. 2018, 2018.
Employing non-orthogonal multiple access scheme in UAV-based wireless networks (Chi-Bao Le)
248 r ISSN: 2302-9285
[13] D-T. Do et al. ”Wireless power transfer enabled NOMA relay systems: two SIC modes and performance
evaluation,” TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 17, no. 6, pp.
2697-2703, 2019.
[14] Dinh-Thuan Do, Chi-Bao Le, A.-T. Le, ”Cooperative underlay cognitive radio assisted NOMA: secondary
network improvement and outage performance,” TELKOMNIKA Telecommunication, Computing, Elec-
tronics and Control, vol. 17, no. 5, pp. 2147-2154, 2019.
[15] D.-T. Do, M. Vaezi and T.-L. Nguyen, ”Wireless Powered Cooperative Relaying using NOMA with Im-
perfect CSI,” Proc. of IEEE Globecom Workshops (GC Wkshps), pp. 1-6, 2018.
[16] D.-T. Do, A.-T. Le, C.-B. Le and B. M. Lee, ”On Exact Outage and Throughput Performance of Cognitive
Radio based Non-Orthogonal Multiple Access Networks With and Without D2D Link,” Sensors (Basel),
vol. 19, no. 15, 2019.
[17] X. Li, J. Li, Y. Liu, Z. Ding and A. Nallanathan, ”Residual Transceiver Hardware Impairments on Coop-
erative NOMA Networks,” IEEE Transactions on Wireless Communications, vol. 19, no. 1, pp. 680-695,
Jan. 2020.
[18] X. Li, J. Li and L. Li, ”Performance Analysis of Impaired SWIPT NOMA Relaying Networks Over
Imperfect Weibull Channels,” IEEE Systems Journal, vol. 14, no. 1, pp. 669-672, March 2020.
[19] X. Li, M. Liu, C. Deng, P. T. Mathiopoulos, Z. Ding and Y. Liu, ”Full-Duplex Cooperative NOMA
Relaying Systems With I/Q Imbalance and Imperfect SIC,” IEEE Wireless Communications Letters, vol.
9, no. 1, pp. 17-20, Jan. 2020.
[20] X. Li, Qunshu Wang, Hongxing Peng, Hui Zhang, Dinh-Thuan Do, Khaled M. Rabie, Rupak Kharel and
Charles C. Cavalcante, “A Unified Framework for HS-UAV NOMA Network: Performance Analysis and
Location Optimization,” IEEE Access, vol. 8, pp. 13329-13340, 2020.
[21] X. Li, J. Li, L. Li, J. Jin, J. Zhang and D. Zhang, ”Effective Rate of MISO Systems Over κ − µ Shadowed
Fading Channels,” IEEE Access, vol. 5, pp. 10605-10611, 2017.
[22] X. Li, M. Liu, C. Deng, , D. Zhang, X. Gao, K. M. Rabie, R. Kharel, “Joint Effects of Residual Hardware
Impairments and Channel Estimation Errors on SWIPT Assisted Cooperative NOMA Networks,” IEEE
Access, pp.1-15, 2019.
[23] X. Li, M. Huang, C. Zhang, D. Deng, K. M Rabie, Y. Ding, and J. Du, ”Security and Reliability Perfor-
mance Analysis of Cooperative Multi-Relay Systems With Nonlinear Energy Harvesters and Hardware
Impairments,” IEEE Access, vol. 7, pp. 102644-102661, 2019.
[24] J. Li, X. Li, Y. Liu, C. Zhang, L. Li and A. Nallanathan, ”Joint Impact of Hardware Impairments and
Imperfect Channel State Information on Multi-Relay Networks,” IEEE Access, vol. 7, pp. 72358-72375,
2019.
[25] I. S. Gradshteyn and I. M. Ryzhik, ”Table of Integrals, Series and Products,” 6th ed. New York, NY, USA:
Academic Press, 2000.
Bulletin of Electr Eng  Inf, Vol. 10, No. 1, February 2021 : 241 – 248

More Related Content

What's hot

Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alter...
Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alter...Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alter...
Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alter...
Mohamed Seif
 
Multiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation PrecodingMultiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation Precodingadeelrazi
 
Telecommunication System Engineering Notes
Telecommunication System Engineering NotesTelecommunication System Engineering Notes
Telecommunication System Engineering Notes
Haris Hassan
 
PIMRC 2016 Presentation
PIMRC 2016 PresentationPIMRC 2016 Presentation
PIMRC 2016 Presentation
Mohamed Seif
 
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
journalBEEI
 
BER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingBER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper Coding
IJEEE
 
MIMO Communications
MIMO CommunicationsMIMO Communications
MIMO Communications
IRJET Journal
 
Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...
Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...
Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...
T. E. BOGALE
 
HOSVD-visualization
HOSVD-visualizationHOSVD-visualization
HOSVD-visualizationKeyvan Sadri
 
Downlink signal evaluation of haps m 55 aircraft above malaysian skies
Downlink signal evaluation of haps m 55 aircraft above malaysian skiesDownlink signal evaluation of haps m 55 aircraft above malaysian skies
Downlink signal evaluation of haps m 55 aircraft above malaysian skiesIAEME Publication
 
An analtical analysis of w cdma smart antenna
An analtical analysis of w cdma smart antennaAn analtical analysis of w cdma smart antenna
An analtical analysis of w cdma smart antenna
marwaeng
 
MartinDickThesis
MartinDickThesisMartinDickThesis
MartinDickThesisMartin Dick
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA network
TELKOMNIKA JOURNAL
 
LSQR-Based-Precoding
LSQR-Based-PrecodingLSQR-Based-Precoding
LSQR-Based-PrecodingQian Han
 
Performance of MMSE Denoise Signal Using LS-MMSE Technique
Performance of MMSE Denoise Signal Using LS-MMSE  TechniquePerformance of MMSE Denoise Signal Using LS-MMSE  Technique
Performance of MMSE Denoise Signal Using LS-MMSE Technique
IJMER
 
Performance of cognitive radio networks with maximal ratio combining over cor...
Performance of cognitive radio networks with maximal ratio combining over cor...Performance of cognitive radio networks with maximal ratio combining over cor...
Performance of cognitive radio networks with maximal ratio combining over cor...
Polytechnique Montreal
 
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELEVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
IJCSES Journal
 

What's hot (20)

Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alter...
Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alter...Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alter...
Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alter...
 
Multiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation PrecodingMultiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation Precoding
 
Telecommunication System Engineering Notes
Telecommunication System Engineering NotesTelecommunication System Engineering Notes
Telecommunication System Engineering Notes
 
PIMRC 2016 Presentation
PIMRC 2016 PresentationPIMRC 2016 Presentation
PIMRC 2016 Presentation
 
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
 
BER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingBER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper Coding
 
wcnc05
wcnc05wcnc05
wcnc05
 
MIMO Communications
MIMO CommunicationsMIMO Communications
MIMO Communications
 
Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...
Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...
Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...
 
HOSVD-visualization
HOSVD-visualizationHOSVD-visualization
HOSVD-visualization
 
Downlink signal evaluation of haps m 55 aircraft above malaysian skies
Downlink signal evaluation of haps m 55 aircraft above malaysian skiesDownlink signal evaluation of haps m 55 aircraft above malaysian skies
Downlink signal evaluation of haps m 55 aircraft above malaysian skies
 
An analtical analysis of w cdma smart antenna
An analtical analysis of w cdma smart antennaAn analtical analysis of w cdma smart antenna
An analtical analysis of w cdma smart antenna
 
MartinDickThesis
MartinDickThesisMartinDickThesis
MartinDickThesis
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA network
 
LSQR-Based-Precoding
LSQR-Based-PrecodingLSQR-Based-Precoding
LSQR-Based-Precoding
 
Lecture set 5
Lecture set 5Lecture set 5
Lecture set 5
 
Performance of MMSE Denoise Signal Using LS-MMSE Technique
Performance of MMSE Denoise Signal Using LS-MMSE  TechniquePerformance of MMSE Denoise Signal Using LS-MMSE  Technique
Performance of MMSE Denoise Signal Using LS-MMSE Technique
 
Vblast
VblastVblast
Vblast
 
Performance of cognitive radio networks with maximal ratio combining over cor...
Performance of cognitive radio networks with maximal ratio combining over cor...Performance of cognitive radio networks with maximal ratio combining over cor...
Performance of cognitive radio networks with maximal ratio combining over cor...
 
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELEVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
 

Similar to Employing non-orthogonal multiple access scheme in UAV-based wireless networks

Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
TELKOMNIKA JOURNAL
 
1. 20934.pdf
1. 20934.pdf1. 20934.pdf
1. 20934.pdf
TELKOMNIKA JOURNAL
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
journalBEEI
 
Outage performance users located outside D2D coverage area in downlink cellul...
Outage performance users located outside D2D coverage area in downlink cellul...Outage performance users located outside D2D coverage area in downlink cellul...
Outage performance users located outside D2D coverage area in downlink cellul...
journalBEEI
 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...
journalBEEI
 
System Consideration, Design and Implementation of Point To Point Microwave L...
System Consideration, Design and Implementation of Point To Point Microwave L...System Consideration, Design and Implementation of Point To Point Microwave L...
System Consideration, Design and Implementation of Point To Point Microwave L...
ijtsrd
 
V2X communication system with non-orthogonal multiple access: outage performa...
V2X communication system with non-orthogonal multiple access: outage performa...V2X communication system with non-orthogonal multiple access: outage performa...
V2X communication system with non-orthogonal multiple access: outage performa...
nooriasukmaningtyas
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
IJCNCJournal
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
TELKOMNIKA JOURNAL
 
On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...
On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...
On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...
TELKOMNIKA JOURNAL
 
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
journalBEEI
 
A new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systemsA new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systems
journalBEEI
 
A low complexity distributed differential scheme based on orthogonal space t...
A low complexity distributed differential scheme based on  orthogonal space t...A low complexity distributed differential scheme based on  orthogonal space t...
A low complexity distributed differential scheme based on orthogonal space t...
IJECEIAES
 
Implementation performance analysis of cordic
Implementation performance analysis of cordicImplementation performance analysis of cordic
Implementation performance analysis of cordiciaemedu
 
Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...
TELKOMNIKA JOURNAL
 
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
amal algedir
 
Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...
IJECEIAES
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
nooriasukmaningtyas
 
Link budget calculation
Link budget calculationLink budget calculation
Link budget calculation
sitimunirah88
 

Similar to Employing non-orthogonal multiple access scheme in UAV-based wireless networks (20)

Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
 
1. 20934.pdf
1. 20934.pdf1. 20934.pdf
1. 20934.pdf
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
 
Outage performance users located outside D2D coverage area in downlink cellul...
Outage performance users located outside D2D coverage area in downlink cellul...Outage performance users located outside D2D coverage area in downlink cellul...
Outage performance users located outside D2D coverage area in downlink cellul...
 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...
 
System Consideration, Design and Implementation of Point To Point Microwave L...
System Consideration, Design and Implementation of Point To Point Microwave L...System Consideration, Design and Implementation of Point To Point Microwave L...
System Consideration, Design and Implementation of Point To Point Microwave L...
 
V2X communication system with non-orthogonal multiple access: outage performa...
V2X communication system with non-orthogonal multiple access: outage performa...V2X communication system with non-orthogonal multiple access: outage performa...
V2X communication system with non-orthogonal multiple access: outage performa...
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
 
On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...
On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...
On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...
 
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
 
A new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systemsA new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systems
 
A low complexity distributed differential scheme based on orthogonal space t...
A low complexity distributed differential scheme based on  orthogonal space t...A low complexity distributed differential scheme based on  orthogonal space t...
A low complexity distributed differential scheme based on orthogonal space t...
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Implementation performance analysis of cordic
Implementation performance analysis of cordicImplementation performance analysis of cordic
Implementation performance analysis of cordic
 
Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...
 
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
 
Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
 
Link budget calculation
Link budget calculationLink budget calculation
Link budget calculation
 

More from journalBEEI

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
journalBEEI
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
journalBEEI
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
journalBEEI
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
journalBEEI
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
journalBEEI
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
journalBEEI
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
journalBEEI
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
journalBEEI
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
journalBEEI
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
journalBEEI
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
journalBEEI
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
journalBEEI
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
journalBEEI
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
journalBEEI
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
journalBEEI
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
journalBEEI
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
journalBEEI
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
journalBEEI
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
journalBEEI
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...
journalBEEI
 

More from journalBEEI (20)

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...
 

Recently uploaded

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 

Recently uploaded (20)

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 

Employing non-orthogonal multiple access scheme in UAV-based wireless networks

  • 1. Bulletin of Electrical Engineering and Informatics Vol. 10, No. 1, February 2021, pp. 241∼248 ISSN: 2302-9285, DOI: 10.11591/eei.v10i1.2102 r 241 Employing non-orthogonal multiple access scheme in UAV-based wireless networks Chi-Bao Le1 , Dinh-Thuan Do 2 1 Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Vietnam 2 Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Vietnam Article Info Article history: Received Oct 27, 2019 Revised Apr 3, 2020 Accepted Jun 25, 2020 Keywords: NOMA Outage Probability UAV ABSTRACT This paper studies the two-hop transmission relying unmanned aerial vehicle (UAV) relays which is suitable to implement in the internet of things (IoT) systems. To en- hance system performance in order to overcome the large scale fading between the base station (BS) and destination as well as achieve the higher spectrum efficiency, where non-orthogonal multiple access (NOMA) strategies were typically applied for UAV relays to implement massive connections transmission. In particular, outage proba- bility is evaluated via signal to noise ratio (SNR) criterion so that the terminal node can obtain reasonable performance. The derivations and analysis results showed that the considered fixed power allocation scheme provides performance gap among two signals at destination.The numerical simulation confirmed the exactness of derived expressions in the UAV assisted system. This is an open access article under the CC BY-SA license. Corresponding Author: Dinh-Thuan Do, Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City, Vietnam. Email: dodinhthuan@tdtu.edu.vn 1. INTRODUCTION Wireless communication technology has pace to adapt demand with rapid development of new tech- niques. The decreasing cost of unmanned aerial vehicle (UAV) network together with the dramatical innovation of UAV-based manufacturing technology provides connections as some difficulties happen. Therefore, some applications such as weather monitoring systems, forest fire prevention technology, man-v-machine are pro- vided by many new UAV applications appeared in the civilian market. In order to implement the UAV relay based IoT networks, wide range of applications of UAV-based network attracts more attentions from community of researchers [1]. Recently, to achieve throughput transmission above 10Gbps, ultra density device connection and millisecond transmission delay, implement of 5G/B5G networks needs UAV assisted communications as reported in [2, 3]. The network coverage expands to 3D interconnection as crucial demand for development of the future communications and it releases the large scale fading regarding very high speed transmission. Moreover, higher cost and difficulty in the construction of cellular stations happen and such situation leads to solutions of the IoT network by employing the UAV relays assisted Communication. UAV-based network benefits to infrastructure development by providing itss convenient implement and lower cost, high-altitude assisted transmission [4, 5]. The main advantages of the UAV relay assisted communications are reducing the obstruction from buildings, mountains and archieving the higher line of sight (LoS) transmission effect [6, 7]. Journal homepage: http://beei.org
  • 2. 242 r ISSN: 2302-9285 Due to ability of massive connections and higher spectrum efficiency, NOMA has attracted great research interest from both academia and industry [8–24]. Since users aware on imperfect channel state infor- mation (CSI), the author studied the impact of imperfect CSI on the performance of NOMA in [15]. In [16], the throughput aspects of the cognitive radio as applying NOMA techniques were discussed and compared. 2. SYSTEM MODEL Figure 1 shows system model containing the two-hop transmission using UAV relay communication model. Two UAV relays operate in half duplex and DF mode to signal forwarding, while separated signal is detected at destination. The terminal IoT node receives signal from two links as shown in Figure 1. Typically, the obstacles or blockage of urban buildings and mountains limit quality of the communication between the base station BS and terminal node D, then the UAV relays are implemented to realize assisted communication. The destination user needs two phases to perform its the transmission process. In the first phase, the BS transmits mixture signal to the two UAV relay nodes R1, R2. The channels hi between the BS and the UAV relays follow Nakagami-m distribution. D R1 R2 1 1 2 2 S S P x P x    1 1 2 2 S S P x P x    1 1 ˆ R P x  2 2 ˆ R P x  BS Figure 1. System model of UAV-assisted NOMA. The received signal at UAV relays are given as yi = hi √ ϕ1PSx1 + √ ϕ2PSx2 , i ∈ {1, 2}. (1) The signal to noise ratio (SNR) is used to dectect x2 as ΓR1,x2 = ϕ2ρ |h1| ϕ1ρ |h1| + 1 , (2) where ρ = PS N0 = PR N0 is the transmit signal to noise radio (SNR). After SIC happens, SNR is given to detect signal x1 as ΓR1,x1 = ϕ1ρ |h1| . (3) Similarly, SNR at R2 to detect x2 is given as ΓR2,x2 = ϕ2ρ |h2| ϕ1ρ |h2| + 1 . (4) Next, we will introduce the channel model of Ri → D link. In general, the UAV coverage is a circular cell and the UAV is located at the vertical center. Thus, the channel vector of Ri → D link can be expressed as Bulletin of Electr Eng Inf, Vol. 10, No. 1, February 2021 : 241 – 248
  • 3. Bulletin of Electr Eng Inf ISSN: 2302-9285 r 243 gi = Liḡi , i ∈ {1, 2}, (5) where the free space loss of the path Li is given by Li = λu 4π q d2 Ri + d2 h , (6) where dh and dRi denote the height of UAV relay and the distance from the center of two UAV relay’s to D, respectively, λu represents the wavelength. Then, in the second phase of communication, each UAV relay forwards detected symbols to the des- tination (uplink-NOMA) and the received signal at user is given as yD = p PR ( √ ϕ1x̂1L1ḡ1 + √ ϕ2x̂2L2ḡ2) . (7) where PR is the normalized transmission powers at two relay’s It can be computed SNR at user D to detect signal x2 is ΓD,x2 = ρϕ2L−2 2 |g2| 2 ρϕ1L−2 1 |g1| 2 + 1 . (8) Then, SNR at user D is calculated to detect signal x1 is ΓD,x1 = ρϕ1L−2 1 |g1| 2 . (9) 3. PERFORMANCE ANALYSIS 3.1. Outage probability of x1 At destination, user D needs detect its signals. However, these signals are evaluated via outage proba- bility. Such outage is defined as probability to SNR less than the pre-defined threshold SNR. We first consider outage performance of x1 as below: Px1 = Pr (ΓR1,x2 ε2 ∪ ΓR1,x1 ε1 ∪ ΓD,x2 ε2 ∪ ΓD,x1 ε1) =1 − Pr (ΓR1,x2 ≥ ε2 ∪ ΓR1,x1 ≥ ε1 ∪ ΓD,x2 ≥ ε2 ∪ ΓD,x1 ≥ ε1) =1 − Pr (|h1| ≥ χ) | {z } A1 Pr |g2| 2 ≥ δ|g1| 2 + $2, |g1| 2 ≥ $1 | {z } A2 , (10) where ε1 = 22R1 − 1 with R1 being the target rate at D to detect x1, ε2 = 22R2 − 1 with R2 being the target rate at D to detect x2, χ = max ε2 ρ(ϕ2−ε2ϕ1) , ε1 ϕ1ρ , δ = ε2ϕ1L−2 1 ϕ2L−2 2 , $1 = ε1 ρϕ1L−2 1 and $2 = ε2 ρϕ2L−2 2 Let Zi = n |hi| 2 , |gi| 2 o , i ∈ {1, 2} and we set, The CDFs and PDFs of Z FZi (x) = 1 − e−µzi x mzi −1 X s=0 µs zi xs s! , (11) and fZi (x) = µ mZi Zi xmZi −1 e−µZi x Γ (mZi ) , (12) Employing non-orthogonal multiple access scheme in UAV-based wireless networks (Chi-Bao Le)
  • 4. 244 r ISSN: 2302-9285 where µzi = mzi λzi A1 = Pr (|h1| ≥ χ) =1 − F|h1| (χ) =e−µh1 χ mh1 −1 X a=0 µa h1 χa a! . (13) Then, A2 is given by A2 = Pr |g2| 2 ≥ δ|g1| 2 + $2, |g1| 2 ≥ $1 = ∞ Z $1 f|g1|2 (x) h 1 − F|g2|2 (δx + $2) i dx = mg2 −1 X d=0 µd g2 µ mg1 g1 e−µg2 $2 d!Γ (mg1 ) ∞ Z $1 xmg1 −1 e−x(µg1 +µg2 δ)(δx + $2) d dx = mg2 −1 X d=0 d X t=0 d t µd g2 µ mg1 g1 $d−t 2 δt e−µg2 $2 d!Γ (mg1 ) ∞ Z $1 xmg1 +t−1 e−x(µg1 +µg2 δ)dx. (14) Applying [[23], (3.351.2)], A2 is given by A2 = mg2 −1 X d=0 d X t=0 mg1 +t−1 X k=0 d t µd g2 µ mg1 g1 $d−t 2 δt Γ (mg1 + t) $k 1 e−µg2 $2−$1(µg1 +µg2 δ) d!k!Γ (mg1 ) (µg1 + µg2 δ) mg1 +t−k (15) where Γ (x) = (x − 1)! is the gamma function. Next, substituting (15) and (13) into (10), Px1 is expressed by Px1 =1 − e−µh1 χ mh1 −1 X a=0 mg2 −1 X d=0 d X t=0 mg1 +t−1 X k=0 d t µd g2 µ mg1 g1 µa h1 χa $d−t 2 δt Γ (mg1 + t) $k 1 a!d!k!Γ (mg1 ) × e−µg2 $2−$1(µg1 +µg2 δ) (µg1 + µg2 δ) mg1 +t−k . (16) When ρ → ∞, by using e−x ≈ 1 − x so the asymptotic of P∞ x1 is formulated by P∞ x1 =1 − (1 − µh1 χ) mh1 −1 X a=0 mg2 −1 X d=0 d X t=0 mg1 +t−1 X k=0 d t µd g2 µ mg1 g1 µa h1 χa $d−t 2 δt Γ (mg1 + t) $k 1 a!d!k!Γ (mg1 ) × [1 − µg2 $2 − $1 (µg1 + µg2 δ)] (µg1 + µg2 δ) mg1 +t−k . (17) According to (8), we have lim ρ→∞ ΓD,x2 = ϕ2L−2 2 |g2|2 ϕ1L−2 1 |g1|2 the approximate of Papp. x1 and Papp. x2 are given by Papp. x1 = Papp. x2 = mg2 −1 X d=0 µd g2 µ mg1 g1 δd Γ (mg1 + d) d!Γ (mg1 ) (µg1 + µg2 δ) mg1 +d . (18) Bulletin of Electr Eng Inf, Vol. 10, No. 1, February 2021 : 241 – 248
  • 5. Bulletin of Electr Eng Inf ISSN: 2302-9285 r 245 3.2. Outage probability of x2 Similarly, outage performance of x2 can be formulated by Px2 = Pr (ΓR2,x2 ε2 ∪ ΓD,x2 ε2) =1 − Pr (ΓR2,x2 ≥ ε2, ΓD,x2 ≥ ε2) =1 − Pr (|h2| ≥ ν) | {z } B1 Pr |g2| 2 ≥ δ|g1| 2 + $2 | {z } B2 , (19) where ν = ε2 ρ(ϕ2−ε2ϕ1) We need compute each outage component as B1 = Pr (|h2| ≥ ν) =1 − F|h2| (ν) =e−µh2 ν mh2 −1 X b=0 µb h2 νb b! . (20) Then, we continue to compute the second term as B2 = Pr |g2| 2 ≥ δ|g1| 2 + $2 = ∞ Z 0 f|g1|2 (x) h 1 − F|g2|2 (δx + $2) i dx = mg2 −1 X d=0 d X t=0 d t µd g2 µ mg1 g1 δt $d−t 2 e−µg2 $2 d!Γ (mg1 ) ∞ Z 0 xmg1 +t−1 e−x(µg1 +µg2 δ)dx. (21) Based on [[17], (3.351.3)], B2 is given by B2 = mg2 −1 X d=0 d X t=0 d t µd g2 µ mg1 g1 δt $d−t 2 Γ (mg1 + t) e−µg2 $2 d!Γ (mg1 ) (µg1 + µg2 δ) mg1 +t . (22) Substituting (22) and (20) into (19), Px2 is given by Px2 = 1 − e−µh2 ν mh2 −1 X b=0 mg2 −1 X d=0 d X t=0 d t µb h2 νb µd g2 µ mg1 g1 δt $d−t 2 Γ (mg1 + t) e−µg2 $2 b!d!Γ (mg1 ) (µg1 + µg2 δ) mg1 +t . (23) Corresponding to formula (17) the asymptotic of P∞ x2 is given by P∞ x2 = 1 − (1 − µh2 ν) mh2 −1 X b=0 mg2 −1 X d=0 d X t=0 d t µb h2 νb µd g2 µ mg1 g1 δt $d−t 2 Γ (mg1 + t) (1 − µg2 $2) b!d!Γ (mg1 ) (µg1 + µg2 δ) mg1 +t . (24) 4. NUMERICAL RESULTS We set fading parameter m = mh1 = mh2 = mg1 = mg2 = 2 and channel gains as λ = λh1 = λh2 = λg1 = λg2 = 1. The power allocation coefficients of NOMA’s users are ϕ1 = 0.1 and ϕ1 = 0.9. The target rates are R1 and R2 and they are set to be R1 = R2 = 0.5. The times of Monte Carlo simulation 107 . The height of UAV dh = 300 m. The distance between R1 → D and R2 → D are dR1D = 200 m and dR1D = 100 m, respectively. Employing non-orthogonal multiple access scheme in UAV-based wireless networks (Chi-Bao Le)
  • 6. 246 r ISSN: 2302-9285 Figure 2 shows outage performance versus transmit SNR. We consider four cases of m. As can be seen from such outage performance, asymptotic curves are very matched with exact curves. Signal x2 exhibits better outage probability compared with x1 since different power allocated to each signal. The simulation results are also very tight with the analytical results. m = 4 is considered as the best case among these curves. Figure 3 confirms that NOMA benefits to outage performance of signal x2 as it is better than OMA method. Figure 4 indicates the optimal outage for signal x1 and it happens at ϕ1 = 0.25. Higher threshold SNR results in worse outage performance of two signals as observation from Figure 5. 0 5 10 15 20 25 30 35 10-3 10-2 10 -1 10 0 Outage Probability m = 1 m = 2 m = 3 m = 4 Figure 2. Outage performance of x1 and x2 versus transmit SNR 0 5 10 15 20 25 30 35 10-3 10-2 10 -1 10 0 Outage Probability m = 4 m = 1 Figure 3. Comparison between OMA and NOMA 0 5 10 15 20 25 30 35 10-3 10-2 10 -1 100 Outage Probability m = 1 m = 2 m = 3 m = 4 Figure 4. Outage performance versus ϕ1, with ρ = 10dB 0 5 10 15 20 25 30 35 10-3 10-2 10 -1 100 Outage Probability m = 4 m = 1 Figure 5. Outage performance versus threshold rates, with ϕ1 = 0.05, ϕ2 = 1.95 and ρ = 20dB 5. CONCLUSION The paper proposed IoT system relying UAV relay to enhance performance of destination. This tech- nique effectively overcomes the large scale fading between the BS and far user. Moreover, the proposed NOMA strategy was typically applied for UAV relays and achieved acceptable outage performance. Meanwhile, the outage probability and throughput closed-form expressions were derived. The derivations and analysis results showed that the proposed multiple parameters joint consideration can effectively improve the system through- put and reduce the system outage probability. Bulletin of Electr Eng Inf, Vol. 10, No. 1, February 2021 : 241 – 248
  • 7. Bulletin of Electr Eng Inf ISSN: 2302-9285 r 247 APENDIX By invoking (15) into (19), it can be expressed the outage probability as OPDF U1 = Pr |hSR| 2 γth1 |hRU1 | 2 +1 (a1−γth1a2)ρ|hRU1 | 2 (25) Based on probability density function (PDF) of |hi| 2 is given as f|hi|2 (x) = λRU1 e−λRU1 x , it can be rewritten as OPDF U1 = ∞ R 0 f|hRU1 | 2 (x) ∞ R γth1(x+1) (a1−γth1a2)ρx f|hRU1 | 2 (y)dxdy = ∞ R 0 1 − e − γth1(x+1) (a1−γth1a2)ρx λRU1 e−λRU1 x dx (26) Thus, based on [25, 3.324.1] OPDF U1 can be obtained as OPDF U1 = ∞ R 0 1 − e − γth1(x+1) (a1−γth1a2)ρx λRU1 e−λRU1 x dx = 1 − 2e − λSRγth1 (a1−γth1a2)ρ q γth1λSRλRU1 (a1−γth1a2)ρ K1 2 q γth1λRU1 λSR (a1−γth1a2)ρ (27) It is end of the proof. ACKNOWLEDGEMENT The acknowledgment section is optional. The funding source of the research can be put here. REFERENCES [1] Y. Zeng, R. Zhang, and T. J. Lim, ”Wireless communications with unmanned aerial vehicles: Opportuni- ties and challenges,” IEEE Commun. Mag., vol. 54, no. 5, pp. 36-42, May 2016. [2] A. Osseiran et al., ”Scenarios for 5G mobile and wireless communications: The vision of the METIS project,” IEEE Commun. Mag., vol. 52, no. 5, pp. 26-35, May 2014. [3] B. Ji, Y. Wang, B. Xing, Y. Wang, K. Song, C. Li, and R. Zhao, ”Efficient protocol design for device- to-device communication in ultra dense networks,” Presented at the Int. Symp. Intell. Signal Process. Commun. Syst. (ISPACS), 2017. [4] L. Gupta, R. Jain, and G. Vaszkun, ”Survey of important issues in UAV communication networks,” IEEE Commun. Surveys Tuts., vol. 18, no. 2, pp. 1123-1152, 2nd Quart., 2015. [5] M. Hua, Y. Wang, Z. Zhang, C. Li, Y. Huang, and L. Yang, ”Power-efficient communication in UAV-aided wireless sensor networks,” IEEE Commun. Lett., vol. 22, no. 6, pp. 1264-1267, Jun. 2018. [6] Y. Zeng and R. Zhang, ”Energy-efficient UAV communication with trajectory optimization,” IEEE Trans. Wireless Commun., vol. 16, no. 6, pp. 3747-3760, Jun. 2017. [7] C. Li, P. Liu, C. Zou, F. Sun, J. M. Cioffi, and L. Yang, ”Spectral-efficient cellular communications with coexistent one- and two-hop transmissions,” IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6765-6772, Aug. 2016. [8] Dinh-Thuan Do and M.-S. Van Nguyen, ”Device-to-device transmission modes in NOMA network with and without Wireless Power Transfer,” Computer Communications, vol. 139, pp. 67-77, May 2019. [9] D.-T. Do and A.-T. Le, ”NOMA based cognitive relaying: Transceiver hardware impairments, relay se- lection policies and outage performance comparison,” Computer Communications, vol. 146, pp. 144-154, 2019. [10] D.-T. Do, A.-T. Le and B.-M. Lee, ”On Performance Analysis of Underlay Cognitive Radio-Aware Hybrid OMA/NOMA Networks with Imperfect CSI,” Electronics, vol. 8, no. 7, 2019. [11] Dinh-Thuan Do and C.-B. Le, ”Application of NOMA in Wireless System with Wireless Power Transfer Scheme: Outage and Ergodic Capacity Performance Analysis,” Sensors, vol. 18, no. 10, 2018. [12] T.-L. Nguyen and Dinh-Thuan Do, ”Exploiting Impacts of Intercell Interference on SWIPT-assisted Non- orthogonal Multiple Access,” Wireless Communications and Mobile Computing, vol. 2018, 2018. Employing non-orthogonal multiple access scheme in UAV-based wireless networks (Chi-Bao Le)
  • 8. 248 r ISSN: 2302-9285 [13] D-T. Do et al. ”Wireless power transfer enabled NOMA relay systems: two SIC modes and performance evaluation,” TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 17, no. 6, pp. 2697-2703, 2019. [14] Dinh-Thuan Do, Chi-Bao Le, A.-T. Le, ”Cooperative underlay cognitive radio assisted NOMA: secondary network improvement and outage performance,” TELKOMNIKA Telecommunication, Computing, Elec- tronics and Control, vol. 17, no. 5, pp. 2147-2154, 2019. [15] D.-T. Do, M. Vaezi and T.-L. Nguyen, ”Wireless Powered Cooperative Relaying using NOMA with Im- perfect CSI,” Proc. of IEEE Globecom Workshops (GC Wkshps), pp. 1-6, 2018. [16] D.-T. Do, A.-T. Le, C.-B. Le and B. M. Lee, ”On Exact Outage and Throughput Performance of Cognitive Radio based Non-Orthogonal Multiple Access Networks With and Without D2D Link,” Sensors (Basel), vol. 19, no. 15, 2019. [17] X. Li, J. Li, Y. Liu, Z. Ding and A. Nallanathan, ”Residual Transceiver Hardware Impairments on Coop- erative NOMA Networks,” IEEE Transactions on Wireless Communications, vol. 19, no. 1, pp. 680-695, Jan. 2020. [18] X. Li, J. Li and L. Li, ”Performance Analysis of Impaired SWIPT NOMA Relaying Networks Over Imperfect Weibull Channels,” IEEE Systems Journal, vol. 14, no. 1, pp. 669-672, March 2020. [19] X. Li, M. Liu, C. Deng, P. T. Mathiopoulos, Z. Ding and Y. Liu, ”Full-Duplex Cooperative NOMA Relaying Systems With I/Q Imbalance and Imperfect SIC,” IEEE Wireless Communications Letters, vol. 9, no. 1, pp. 17-20, Jan. 2020. [20] X. Li, Qunshu Wang, Hongxing Peng, Hui Zhang, Dinh-Thuan Do, Khaled M. Rabie, Rupak Kharel and Charles C. Cavalcante, “A Unified Framework for HS-UAV NOMA Network: Performance Analysis and Location Optimization,” IEEE Access, vol. 8, pp. 13329-13340, 2020. [21] X. Li, J. Li, L. Li, J. Jin, J. Zhang and D. Zhang, ”Effective Rate of MISO Systems Over κ − µ Shadowed Fading Channels,” IEEE Access, vol. 5, pp. 10605-10611, 2017. [22] X. Li, M. Liu, C. Deng, , D. Zhang, X. Gao, K. M. Rabie, R. Kharel, “Joint Effects of Residual Hardware Impairments and Channel Estimation Errors on SWIPT Assisted Cooperative NOMA Networks,” IEEE Access, pp.1-15, 2019. [23] X. Li, M. Huang, C. Zhang, D. Deng, K. M Rabie, Y. Ding, and J. Du, ”Security and Reliability Perfor- mance Analysis of Cooperative Multi-Relay Systems With Nonlinear Energy Harvesters and Hardware Impairments,” IEEE Access, vol. 7, pp. 102644-102661, 2019. [24] J. Li, X. Li, Y. Liu, C. Zhang, L. Li and A. Nallanathan, ”Joint Impact of Hardware Impairments and Imperfect Channel State Information on Multi-Relay Networks,” IEEE Access, vol. 7, pp. 72358-72375, 2019. [25] I. S. Gradshteyn and I. M. Ryzhik, ”Table of Integrals, Series and Products,” 6th ed. New York, NY, USA: Academic Press, 2000. Bulletin of Electr Eng Inf, Vol. 10, No. 1, February 2021 : 241 – 248