Non-orthogonal multiple access (NOMA) has drawn enormous attention from the research community as a promising technology for future wireless communications with increasing demands of capacity and throughput. Especially, in the light of fifth-generation (5G) communication where multiple internet-of-things (IoT) devices are connected, the application of NOMA to indoor wireless networks has become more interesting to study. In view of this, we investigate the NOMA technique in energy harvesting (EH) half-duplex (HD) decode-and-forward (DF) power-splitting relaying (PSR) networks over indoor scenarios which are characterized by log-normal fading channels. The system performance of such networks is evaluated in terms of outage probability (OP) and total throughput for delay-limited transmission mode whose expressions are derived herein. In general, we can see in details how different system parameters affect such networks thanks to the results from Monte Carlo simulations. For illustrating the accuracy of our analytical results, we plot them along with the theoretical ones for comparison.
Outage performance of downlink NOMA-aided small cell network with wireless po...journalBEEI
This article considers the outage performance of the downlink transmission for a small cell network in a heterogeneous network. Due to mobility and distribution of users, it is necessary to study massive connections and high energy efficiency for such kind of systems. To be an enabler of energy harvesting, a power beacon is helpful to support the base station to send signals to distant users, and wireless power transfer (WPT) is exploited to guarantee the data packets transmission from the power beacon to the base station. To provide massive connections, we propose a novel non-orthogonal multiple access (NOMA) technique combined with WPT to enhance outage performance and latency reduction. Furthermore, we derive outage probability (OP) to characterize the system performance. Simulation results are verified to match well between theoretical and analytical methods, and main parameters are determined to understand how they affect the proposed scheme.
On the performance of non-orthogonal multiple access (NOMA) using FPGAIJECEIAES
In this paper, non-orthogonal multiple access (NOMA) is designed and implemented for the fifth generation (5G) of multi-user wireless communication. Field-programmable gate array (FPGA) is considered for the implementation of this technique for two users. NOMA is applied in downlink phase of the base-station (BS) by applying power allocation mechanism for far and near users, in which one signal contains the superposition of two scaled signals depending on the distance of each user from the BS. We assume an additive white Gaussian noise (AWGN) channel for each user in the presence of the interference due to the non-orthogonality between the two users’ signals. Therefore, successive-interference cancellation (SIC) is exploited to remove the undesired signal of the other user. The outage probability and the biterror rate performance are presented over different signal-to-interference-plus-noise ratio (SINR). Furthermore, Monte-Carlo simulations via Matlab are utilized to verify the results obtained by FPGA, which show exact-close match.
Its exploring the technique for spatially successive interference cancellation and superposition of transmission for upcoming radio communication 5G technology.
3 S W 2009 I E E E Abstracts Java, N C C T Chennaincct
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
Outage performance of downlink NOMA-aided small cell network with wireless po...journalBEEI
This article considers the outage performance of the downlink transmission for a small cell network in a heterogeneous network. Due to mobility and distribution of users, it is necessary to study massive connections and high energy efficiency for such kind of systems. To be an enabler of energy harvesting, a power beacon is helpful to support the base station to send signals to distant users, and wireless power transfer (WPT) is exploited to guarantee the data packets transmission from the power beacon to the base station. To provide massive connections, we propose a novel non-orthogonal multiple access (NOMA) technique combined with WPT to enhance outage performance and latency reduction. Furthermore, we derive outage probability (OP) to characterize the system performance. Simulation results are verified to match well between theoretical and analytical methods, and main parameters are determined to understand how they affect the proposed scheme.
On the performance of non-orthogonal multiple access (NOMA) using FPGAIJECEIAES
In this paper, non-orthogonal multiple access (NOMA) is designed and implemented for the fifth generation (5G) of multi-user wireless communication. Field-programmable gate array (FPGA) is considered for the implementation of this technique for two users. NOMA is applied in downlink phase of the base-station (BS) by applying power allocation mechanism for far and near users, in which one signal contains the superposition of two scaled signals depending on the distance of each user from the BS. We assume an additive white Gaussian noise (AWGN) channel for each user in the presence of the interference due to the non-orthogonality between the two users’ signals. Therefore, successive-interference cancellation (SIC) is exploited to remove the undesired signal of the other user. The outage probability and the biterror rate performance are presented over different signal-to-interference-plus-noise ratio (SINR). Furthermore, Monte-Carlo simulations via Matlab are utilized to verify the results obtained by FPGA, which show exact-close match.
Its exploring the technique for spatially successive interference cancellation and superposition of transmission for upcoming radio communication 5G technology.
3 S W 2009 I E E E Abstracts Java, N C C T Chennaincct
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksTELKOMNIKA JOURNAL
The strictly positive secrecy capacity (SPSC) performance is examined in a new design of non-orthogonal multiple access (NOMA) considered in this study. This system model employs Amplify-and-Forward (AF) relaying scheme to serve far users. In this scheme, a transmitter sends confidential signal to far users. It can be raised falling performance in the presence of an external eavesdropper in such NOMA system. With regard to orthogonal multiple access (OMA), performance of NOMA system model is compared. In particular, tradeoff the SPSC performance and transmit SNR is examined. In this study, the SPSC is evaluated as the secrecy metric to limit impacts of the practical passive eavesdropper in real scenario. It is confirmed that the secrecy performance of NOMA is significantly lower than OMA due to related parameters characterization in NOMA, and it should be controlled by varying related coefficients. As main results, both of NOMA and OMA against to impact of eavesdropper is studied in terms of analytically result and numerically result.
One of the main challenges faced by the developing (3GPP-LTE-Advanced) standard is providing high throughput at the cell edge.
One solution to improve coverage is the use of fixed relays.
This slide includes
Advanced multiplexing
Code Division Multiplexing
Dense Wavelength Division Multiplexing
OFDM
Connectionless
LAN
L3 SWTICH
SLIP
PPP
CORE AND DISTRIBUTION NETWORKS.
GSM-Mobility Management-Call Control
GRPS-Network elements
Radio Resource Management
Mobility Management and Session Management
Small Screen Web Browsing
UTRAN-Core and Radio Network Mobility Management
UMTS Security
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...Sukhvinder Singh Malik
This paper provides analysis of BER and Number of Errors for MIMO-OFDM wireless communication system by using different modulation techniques. Wireless designers constantly seek to improve the spectrum efficiency/capacity, coverage of wireless networks, and link reliability. So the performances of the wireless communication systems can be enhanced by using multiple transmit and receive antennas, which is generally referred to as the MIMO technique. Here analysis will be carried out for an OFDM wireless communication system using different modulation techniques and considering the effect and the wireless channel like AWGN, fading. Performance results will be evaluated numerically and graphically using the plots of BER versus SNR and plots of number of errors versus SNR.
Deterministic MIMO Channel Capacity
• CSI is Known to the Transmitter Side
• CSI is Not Available at the Transmitter Side
Channel Capacity of Random MIMO Channels
In Frequency-division multiple access (FDMA), the available channel bandwidth is divided into many non overlapping frequency bands, where each band is dynamically assigned to a specific user to transmit data.
Like FDM, OFDM uses multiple subcarriers BUT:
There are closely spaces to each other without causing interference, removing guard bands.
Its possible because subcarriers are orthogonal.
OFDMA allocates multi-user in time domain as well in frequency domain. OFDMA is a very popular Multiplexing method used for many of the latest wireless and telecommunication standards,
Optical channel Capacity of MIMO system
This ppt is useful for all candidates of Electronics and Communication Engineering. It contains theory and mathematical
derivation of complete syllabus.
Physical security with power beacon assisted in half-duplex relaying networks...TELKOMNIKA JOURNAL
In this research, we proposed and investigated physical security with power beacon assisted in half-duplex relaying networks over a Rayleigh fading channel. In this model, the source (S) node communicates with the destination (D) node via the helping of the intermediate relay (R) node. The D and R nodes harvest energy from the power beacon (PB) node in the presence of a passive eavesdropper (E) node. Then we derived the integral form of the system outage probability (OP) and closed form of the intercept probability (IP). The correctness of the analytical of the OP and IP is verified by the Monte Carlo simulation. The influence of the main system parameters on the OP and IP also is investigated. The research results indicated that the analytical results are the same as the simulation ones.
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...journalBEEI
Non-orthogonal multiple access (NOMA) with advantages such as superior spectral efficiency has been considered as a promising multiple access technique for the fifth-generation (5G) mobile networks. In this research, we propose energy harvesting (EH) NOMA system relaying network over Rayleigh fading channel using selection combining at the receiver. Firstly, we investigate the system performance in terms of the closed-form expression of the outage probability (OP). Here we compare the OP of two destination users of the proposed system. Finally, all the results is convinced by the Monte Carlo simulation. From the results, we can confirm that all the analytical and simulation results are the same in connection with the primary system parameters.
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksTELKOMNIKA JOURNAL
The strictly positive secrecy capacity (SPSC) performance is examined in a new design of non-orthogonal multiple access (NOMA) considered in this study. This system model employs Amplify-and-Forward (AF) relaying scheme to serve far users. In this scheme, a transmitter sends confidential signal to far users. It can be raised falling performance in the presence of an external eavesdropper in such NOMA system. With regard to orthogonal multiple access (OMA), performance of NOMA system model is compared. In particular, tradeoff the SPSC performance and transmit SNR is examined. In this study, the SPSC is evaluated as the secrecy metric to limit impacts of the practical passive eavesdropper in real scenario. It is confirmed that the secrecy performance of NOMA is significantly lower than OMA due to related parameters characterization in NOMA, and it should be controlled by varying related coefficients. As main results, both of NOMA and OMA against to impact of eavesdropper is studied in terms of analytically result and numerically result.
One of the main challenges faced by the developing (3GPP-LTE-Advanced) standard is providing high throughput at the cell edge.
One solution to improve coverage is the use of fixed relays.
This slide includes
Advanced multiplexing
Code Division Multiplexing
Dense Wavelength Division Multiplexing
OFDM
Connectionless
LAN
L3 SWTICH
SLIP
PPP
CORE AND DISTRIBUTION NETWORKS.
GSM-Mobility Management-Call Control
GRPS-Network elements
Radio Resource Management
Mobility Management and Session Management
Small Screen Web Browsing
UTRAN-Core and Radio Network Mobility Management
UMTS Security
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...Sukhvinder Singh Malik
This paper provides analysis of BER and Number of Errors for MIMO-OFDM wireless communication system by using different modulation techniques. Wireless designers constantly seek to improve the spectrum efficiency/capacity, coverage of wireless networks, and link reliability. So the performances of the wireless communication systems can be enhanced by using multiple transmit and receive antennas, which is generally referred to as the MIMO technique. Here analysis will be carried out for an OFDM wireless communication system using different modulation techniques and considering the effect and the wireless channel like AWGN, fading. Performance results will be evaluated numerically and graphically using the plots of BER versus SNR and plots of number of errors versus SNR.
Deterministic MIMO Channel Capacity
• CSI is Known to the Transmitter Side
• CSI is Not Available at the Transmitter Side
Channel Capacity of Random MIMO Channels
In Frequency-division multiple access (FDMA), the available channel bandwidth is divided into many non overlapping frequency bands, where each band is dynamically assigned to a specific user to transmit data.
Like FDM, OFDM uses multiple subcarriers BUT:
There are closely spaces to each other without causing interference, removing guard bands.
Its possible because subcarriers are orthogonal.
OFDMA allocates multi-user in time domain as well in frequency domain. OFDMA is a very popular Multiplexing method used for many of the latest wireless and telecommunication standards,
Optical channel Capacity of MIMO system
This ppt is useful for all candidates of Electronics and Communication Engineering. It contains theory and mathematical
derivation of complete syllabus.
Physical security with power beacon assisted in half-duplex relaying networks...TELKOMNIKA JOURNAL
In this research, we proposed and investigated physical security with power beacon assisted in half-duplex relaying networks over a Rayleigh fading channel. In this model, the source (S) node communicates with the destination (D) node via the helping of the intermediate relay (R) node. The D and R nodes harvest energy from the power beacon (PB) node in the presence of a passive eavesdropper (E) node. Then we derived the integral form of the system outage probability (OP) and closed form of the intercept probability (IP). The correctness of the analytical of the OP and IP is verified by the Monte Carlo simulation. The influence of the main system parameters on the OP and IP also is investigated. The research results indicated that the analytical results are the same as the simulation ones.
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...journalBEEI
Non-orthogonal multiple access (NOMA) with advantages such as superior spectral efficiency has been considered as a promising multiple access technique for the fifth-generation (5G) mobile networks. In this research, we propose energy harvesting (EH) NOMA system relaying network over Rayleigh fading channel using selection combining at the receiver. Firstly, we investigate the system performance in terms of the closed-form expression of the outage probability (OP). Here we compare the OP of two destination users of the proposed system. Finally, all the results is convinced by the Monte Carlo simulation. From the results, we can confirm that all the analytical and simulation results are the same in connection with the primary system parameters.
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMATELKOMNIKA JOURNAL
In this paper, new radio access scheme that combines Amplify-and-Forward (AF) relaying protocol and non-orthogonal multiple access (NOMA) system is introduced. In particular, different scenarios for fixed power allocation scheme is investigated. In addition, the outage probability of both weak and strong user is derived and provided in closed-form expressions. Such outage is investigated in high SNR scenario and comparison performance between these NOMA scenarios is introduced. Numerical simulations are offered to clarify the outage performance of the considered scheme if varying several parameters in the existing schemes to verify the derived formulas.
Hybrid protocol for wireless EH network over weibull fading channel: performa...IJECEIAES
In this paper, the hybrid TSR-PSR protocol for wireless energy harvesting (EH) relaying network over the Weibull fading channel is investigated. The system network is working in half-duplex (HD) mode. For evaluating the system performance, the closed-form and integral-form expressions of the outage probability (OP) are investigated and derived. After that, numerical results convinced that our derived analytical results are the same with the simulation results by using Monte Carlo simulation. This paper provides a novel recommendation for the wireless EH relaying network.
Secure outage probability of cognitive radio network relying non-orthogonal m...journalBEEI
This paper studies the secondary network relying relay selection to transmit signal from the secondary source (base station) to two destinations. Especially, two destinations are required non-orthogonal multiple access (NOMA) scheme and it benefits to implementation of the Internet of Things (IoT) systems. However, eavesdropper over-hears signal related link from selected relay to destination. This paper measure secure performance via metric, namely secure outage probability (SOP). In particular, signal to noise ratio (SNR) criterion is used to evalute SOP to provide reliable transmission to the terminal node. Main results indicates that the considered scheme provides performance gap among two signals at destination. The exactness of derived expressions is confirmed via numerical simulation.
Adaptive relaying protocol for wireless energy harvesting and information pro...journalBEEI
In order to satisfy the increasing data rate demands, the research in the fifth-generation (5G) wireless networks is ongoing, both in academia and industry. In this research, we propose and investigate adaptive relaying protocol (ARP) For wireless energy harvesting (EH) and information processing in NOMA systems. Firstly, we investigate and derive the closed-form and integral-form expressions of the outage probability (OP) of the model system. Then, all the results are convinced by the Monte Carlo simulation. The research results show that all the analytical and simulation results are the same in connection with the primary system parameters. This research can provide a recommendation for NOMA system network.
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...TELKOMNIKA JOURNAL
Nowadays, many research papers focus on the WPCN problem and how to improve its
efficiency. In this research, we propose and investigate Hybrid Decode-Amplify and Forward Protocol
(HDAF) of the Full-Duplex (FD) Energy Harvesting (EH) Relaying Network with the Time Switching (TS)
protocol. In the beginning stage, we present the HDAF mode, which can be work like a
Decode-and-Amplify (DF) or Amplify-and-Forward (AF) modes based on the best of its performance in the
FD EH relaying network. Furthermore, the closed-form expression of the outage probability (OT) is
analyzed and derived in connection with the primary system parameters. Besides, the comparison of
the system performance in the AF, DF, and HDAF is proposed and investigated. Finally, all the results are
convinced by the Monte Carlo simulation for all cases.
Tractable computation in outage performance analysis of relay selection NOMATELKOMNIKA JOURNAL
In recent years, using full-duplex (FD) transmission model provides enhanced bandwidth efficiency and improved performance for non-orthogonal multiple access (NOMA) system. However, lack of papers have investigated FD relay together with relay selection issue to improve performance of NOMA system. The problems in power allocation for two NOMA users satisfying fairness as well as relay selection strategy are studied in this paper. By considering the outage performance of proposed scheme with its vital result, general NOMA wireless networks can be developed for future networks due to its improved performance. Simulation results show that the relaying selection scheme can achieve a significant performance improvement by increasing required quantity of relay.
Intercept probability analysis in DF time switching full-duplex relaying netw...TELKOMNIKA JOURNAL
In this research, we propose and investigate intercept probability analysis in DF time switching relaying full-duplex with impact of Co-channel interference at the eavesdropper. In the beginning stage, we present the DF time switching relaying full-duplex with the Impact of Co-channel interference at the eavesdropper. Furthermore, the closed-form expression of the intercept probability (IP) is analyzed and derived in connection with the primary system parameters. Finally, the Monte Carlo simulation is performed for verifying the correctness of the analytical section. From the research results, a novel solution and some recommendations can be proposed for the communication network in the near future.
A new look on CSI imperfection in downlink NOMA systemsjournalBEEI
Observing that cooperative scheme benefits to non-orthogonal multiple access (NOMA) systems, we focus on system performance analysis of downlink. However, spectrum efficiency is still high priority to be addressed in existing systems and hence this paper presents full-duplex enabling in NOMA systems. Other challenge needs be considered related to channel state information (CSI). In particular, we derive closedform expressions of outage probability for such NOMA systems under the presence of CSI imperfection. Furthermore, to fully exploit practical environment, we provide system model associated with Nakagami-m fading. The Monte-Carlo simulations are conducted to verify the exactness of considered systems.
Physical security layer with friendly jammer in half-duplex relaying networks...journalBEEI
In this research, thephysical security layer with a friendly jammerin half-duplex (HD) relaying networksover the Rayleigh fading channel is proposed and investigated. Firstly, we proposed the system model and the time switching,power splitting protocolsfor the system model. Then we conductedthe mathematical analysisfor deriving the exact analysis and asymptotic analysisintegral forms for intercept probability (IP). Finally, the analytical formulationis verified by the Monte Carlo simulation with all main system parameters. From the results, we can show that the simulation and analytical values are the same values.
Implement of multiple access technique by wireless power transfer and relayin...journalBEEI
In this paper, we investigate non-orthogonal multiple access (NOMA) network relying on wireless power transfer to prolong lifetime. The base station (BS) sends common signals to the relay with two functions (energy harvesting (EH) and signal processing) to further serve two NOMA users in downlink. Performance gap exists since different power allocation factor assigned from power splitting protocol adopted at the relay and such relay employs both amplify-and-forward (AF) and decode-and-forward schemes. To provide performance metrics, we prove formulas of the outage probability which is a function of transmit signal to noise ratio. Simulation results indicate specific parameters to adjust system performance of two user in the considered EH-NOMA system. This finding is important recommendation to design EH-NOMA which shows particular outage performance at required target rates.
Studying strictly positive secure capacity in cognitive radio-based non-ortho...journalBEEI
This paper studies a downlink security-aware secure outage performance in the secondary network of cognitive radio-assisted non-orthogonal multiple access network (CR-NOMA). The multiple relay is employed to assist transmission from the secondary source to destinations. The security-aware performance is subject to constraints in fixed power allocation factor assigned to each secondary user. The security-aware secure performance is based on channel state information (CSI) at the physical layer in which an eavesdropper intends to steal information. According to the considered system, exact expressions of Strictly positive secure capacity (SPSC) are proved to analyze system in terms of secure performance. Finally, the secondary user secure problem is evaluated via Monte-Carlo simulation method. The main results indicate that the secure performance of proposed system can be improved significantly.
Performance enhancement of wireless sensor network by using non-orthogonal mu...nooriasukmaningtyas
In this paper, we investigate a relaying wireless sensor network (WSN) with
the non-orthogonal multiple access (NOMA) and sensor node selection
schemes over rayleigh fading. Precisely, the system consists of two sensor
clusters, a sink node, and an amplify-and-forward (AF) relay. These sensors
applying the NOMA and sensor node selection schemes transmit the sensing
data from the sensor clusters via the relay to the sink. We derived the
expressions of outage probability and throughput for two sensor nodes. We
also provide numerical results to examine the behavior of the system. Finally,
we verify the validity of our analysis by using the monte-carlo simulation.
This paper measures end-to-end (e2e) throughput of power beacon-assisted multi-hop decode-and-forward (DF) relaying scheme adopting non-orthogonal multiple access (NOMA) and transmit antenna selection (TAS)/selection combining (SC). Particularly, TAS/SC and NOMA are adopted at each hop to relay different data of a source to multiple destinations. Moreover, the transmitters including source and relays have to harvest wireless energy from radio frequency (RF) signals from a power beacon. We also propose a simple and efficient power allocation method for the signals transmitted at each hop. For performance measurement and comparison, we provide closed-form formulas of the e2e throughput over Rayleigh fading channel. We then verify our derivations by computer simulations as well as compare the e2e throughput performance between our scheme and the corresponding one that does not use NOMA.
Study on outage performance gap of two destinations on CR-NOMA networkTELKOMNIKA JOURNAL
Non-orthogonal multiple access (NOMA) and cognitive radio (CR) are promising to overcome spectral scarcity problem encountered in applications implementations in wireless communication. Especially, massive connectivity in such network is strict requirement in network deployment. This study aims to improve spectral efficiency at two secondary destinations by investigating a CR-NOMA network under situation of the perfect successive interference cancellation (SIC). We also derive the exact outage probability for secondary users. Furthermore, an approximate computation method is applied to indicate more insights. It is confirmed that the performance achieved together with performance gap among two users can be obtained due to different power allocation factors assigned to users.
Physical layer security in DF full-duplex relaying network: performance analysisnooriasukmaningtyas
In this letter, the system performance of the DF full-duplex (FD) relaying
communication network is investigated with physical layer security (PLS). In
this system model, the source (S) and the destination (D) communicate via a
helping relay (R) in the presence of the eavesdropper (E). From the system
model, we derive the closed-form expressions for intercept probability (IP)
and secrecy outage probability (SOP). For verifying the correctness of the
analytical analysis, the Monte Carlo simulation is conducted. In addition, the
influence of the main system parameter on the system performance is
investigated. Finally, the results show that the analytical and the simulation
values agree well with each other.
Enabling full-duplex in multiple access technique for 5G wireless networks ov...TELKOMNIKA JOURNAL
Nowadays, unmanned aerial vehicle (UAV) relays’assisted Internet of Things (IoT) systems provide facility in order to overcome the large scale fading between source and sink. The full-duplex scheme enables wireless network to provide higher spectrum efficient technology. This paper analyses performance of two users which are served by new emerging non-orthogonal multiple access (NOMA) technique. Exact outage probability of such two users are derived and checked via Monte-Carlo simulation. These analytical results provide guideline to design UAV in real application. This paper provides a comprehensive study to examine impact of interference, fixed power allocation factors to system performance.
A Threshold Enhancement Technique for Chaotic On-Off Keying SchemeCSCJournals
In this paper, an improvement for Chaotic ON-OFF (COOK) Keying scheme is proposed. The scheme enhances Bit Error Rate (BER) performance of standard COOK by keeping the signal elements at fixed distance from the threshold irrespective of noise power. Each transmitted chaotic segment is added to its flipped version before transmission. This reduces the effect of noise contribution at correlator of the receiver. The proposed system is tested in Additive White Gaussian Noise (AWGN) channel and compared with the standard COOK under different Eb/No levels. A theoretical estimate of BER is derived and compared with the simulation results. Effect of spreading factor increment in the proposed system is studied. Results show that the proposed scheme has a considerable advantage over the standard COOK at similar average bit energy and with higher values of spreading factors.
Enabling relay selection in non-orthogonal multiple access networks: direct a...TELKOMNIKA JOURNAL
In this paper, we consider downlink non-orthogonal multiple access (NOMA) in which the relay selection (RS) scheme is enabled for cooperative networks. In particular, we investigate impact of the number of relays on system performance in term of outage probability. The main factors affecting on cooperative NOMA performance are fixed power allocations coefficients and the number of relay. This paper also indicate performance gap of the outage probabilities among two users the context of NOMA. To exhibit the exactness of derived formula, we match related results between simulation and analytical methods. Numerical results confirms that cooperative NOMA networks benefit from increasing the number of relay.
Similar to Outage performance analysis of non-orthogonal multiple access systems with RF energy harvesting (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Outage performance analysis of non-orthogonal multiple access systems with RF energy harvesting
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 11, No. 5, October 2021, pp. 4135~4142
ISSN: 2088-8708, DOI: 10.11591/ijece.v11i5.pp4135-4142 4135
Journal homepage: http://ijece.iaescore.com
Outage performance analysis of non-orthogonal multiple access
systems with RF energy harvesting
Hoang Thien Van1
, Vo Tien Anh2
, Danh Hong Le3
, Ma Quoc Phu4
, Hoang-Sy Nguyen5
1,2
The Saigon International University (SIU), Ho Chi Minh City, Vietnam
3
Van Hien University, Ho Chi Minh City, Vietnam
4
Binh Duong University, Thu Dau Mot City, Binh Duong Province, Vietnam
5
Eastem International University, Binh Duong Province, Vietnam
Article Info ABSTRACT
Article history:
Received Aug 16, 2020
Revised Mar 4, 2021
Accepted Mar 15, 2021
Non-orthogonal multiple access (NOMA) has drawn enormous attention
from the research community as a promising technology for future wireless
communications with increasing demands of capacity and throughput.
Especially, in the light of fifth-generation (5G) communication where
multiple internet-of-things (IoT) devices are connected, the application of
NOMA to indoor wireless networks has become more interesting to study. In
view of this, we investigate the NOMA technique in energy harvesting (EH)
half-duplex (HD) decode-and-forward (DF) power-splitting relaying (PSR)
networks over indoor scenarios which are characterized by log-normal fading
channels. The system performance of such networks is evaluated in terms of
outage probability (OP) and total throughput for delay-limited transmission
mode whose expressions are derived herein. In general, we can see in details
how different system parameters affect such networks thanks to the results
from Monte Carlo simulations. For illustrating the accuracy of our analytical
results, we plot them along with the theoretical ones for comparison.
Keywords:
Delay-limited transmission
Energy harvesting
Log-normal fading
NOMA
Outage probability
PSR-based protocol
This is an open access article under the CC BY-SA license.
Corresponding Author:
Danh Hong Le
Van Hien University
Ho Chi Minh City, Vietnam
Email: danhlh@vhu.edu.vn
1. INTRODUCTION
NOMA technology is well-known because of its ability to serve multiple users exploiting the same
resource block [1], [2]. Additionally, we can find in the existing literature the principal elements of NOMA,
which have been well investigated, such as superposition coding, successive interference cancellation (SIC).
Thus, it is needless to mention the convenience of deploying NOMA for the massive connectivity need of 5G
and IoT applications, [3]-[8]. Besides, simultaneous wireless information and power transfer (SWIPT)
systems, as the name suggests, exploit the radio frequency (RF) for EH and transferring data to power finite-
capacity batteries in wireless relaying networks, [9]-[14]. Indeed, we can find a wide range of studies relating
to EH relaying networks for outdoor scenarios in [15]-[24]. Specifically, in [15]-[17], the two relaying
protocols namely power splitting-based (PS) and time switching-based (TS) and their hybrid version in
cooperative relaying networks were studied. Additionally, two relay operation modes so-called amplify-and-
forward (AF) and decode-forward (DF) were investigated in [18]. Especially in [22]-[24], the authors
analyzed the system performance of SWIPT networks in the context of NOMA. On the contrary, despite
being excellent in modelling the indoor fading variations caused by building walls and moving objects
[25]-[27], log-normal fading channels are not studied that intensively comparing to common fading channels
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142
4136
such as Rayleigh, Nakagami-m. Among the rare study pieces concerning indoor log-normal fading, there
were [28-31]. Motivated by the above works, in this paper, we investigate the outage performance of NOMA
EH-HD-DF-PSR networks. Differing itself from the existing works, we analyze the networks in indoor
scenarios which we model with log-normal fading channels. In section 2, we describe the system model.
Section 3 presents the and throughput analytical expressions of the in-studied networks. In section 4, we
discuss the simulation results from the derived expressions. Finally, section 5 concludes our paper.
2. SYSTEM MODEL
Depicted in Figure 1(a) is the in-studied system model whereas a source (𝑆) attempts to transmit
data to two user devices denoted as 𝑈1 and 𝑈2. However, we can see that the 𝑆 → 𝑈2 communication link
cannot be realized because of the in-between obstacle. Thereby, 𝑈1 is employed to relay the data transmitted
from 𝑆 to 𝑈2. It should be noted that 𝑈1 operates in DF mode and is energized by EH the signal that 𝑆 sends.
The 𝑆 → 𝑈1 and 𝑈1 → 𝑈2 distances are denoted with 𝑑1 and 𝑑2, and assigned with complex channel
coefficients of ℎ1 and ℎ2, respectively. Besides, there are two random variables (RVs) denoted as |ℎ1|2
and
|ℎ2|2
. The two RVs are independently and identically distributed (i.i.d) over the time block in the log-normal
distribution manner, with parameters 𝐿𝑁(𝜇ℎ1
, 𝜎ℎ1
2
) and 𝐿𝑁(𝜇ℎ2
, 𝜎ℎ2
2
), respectively. Additionally, we have 𝜇ℎ1
is the mean value of 10 log(|ℎ1|2), and 𝜎ℎ𝑖
2
is the standard deviation of 10 log(|ℎ𝑖|2), 𝑖 ∈ {1,2}. With regard
to Figure 1(b), we can see the PSR protocol that 𝑈1 employs in this study for EH and information
transmission (IT) over the time block 𝑇. Specifically, we have 𝑇 divided into two 𝑇/2 blocks with details
below.
(a)
(b)
Figure 1. This figure are; (a) System model, (b) PSR protocol
2.1. In first time slot
During the first time slot 𝑇/2, 𝑆 transmits data with a transmission power of 𝐸𝑠 to 𝑈1. The second
time slot, remaining 𝑇/2, is used for IT from 𝑈1 to 𝑈2. As aforementioned, PSR protocol 𝑈1 separates the 𝐸𝑠
to two portions for EH and IT purposes. We denote the power splitting (PS) ratio as 𝛼, 0 < 𝛼 < 1. Thereby,
at 𝑈1, the energy amount from EH process is:
2
1 1 ( / 2),
m
H S
E h d E T
−
= (1)
3. Int J Elec & Comp Eng ISSN: 2088-8708
Outage performance analysis of non-orthogonal multiple access systems … (Hoang Thien Van)
4137
where 0 < 𝜂 < 1 is the EH efficiency at the energy receiver, determined by the rectifier and EH circuitry that
𝑈1 deploys. Employing the superposition property of S's transmit signal in NOMA scheme
[1, 2], the received signal at 𝑈1 is expressed as shown in (2).
( )
1 1
1 1 1 1 2 1 2 ,
m m
U S S U
y h a E d x a E d x n
− −
= + + (2)
where we have 𝑎1 and 𝑎2 are, respectively, the power allocation coefficients of target signal 𝑥1and 𝑥2 that 𝑆
attempts to send to 𝑈1 and 𝑈2. Besides, we have the additive white Gaussian noise (AWGN) at 𝑈1, which is
𝑛𝑈1
, with variance 𝑁0. We assume that 𝐸[𝑥1
2] = 𝐸[𝑥2
2] = 1. Since 𝑈2 is further from S than 𝑈1, it is allocated
with more power. Thus, we have 𝑎2 > 𝑎1 > 0, which satisfies 𝑎1 + 𝑎2 = 1. Additionally, the 𝑈1 consumes a
portion of the energy harvested for its operation while the rest is utilized for DF the received signal to 𝑈2.
Thereby, we can express the transmission power at 𝑈1with regard to the harvested energy 𝐸𝐻 as shown in (3).
1
2
2
1 1
1 1
( / 2)
.
( / 2) ( / 2)
m
S m
H
U S
h d E T
E
E h d E
T T
−
−
= = = (3)
Considering (2), we have the received signal-to-interference-plus-noise ratio (SINR) at 𝑈1 for
detecting the signal 𝑥2 of 𝑈2 formulated in (4).
1 2
2
1 1 2
, 2
1 1 1
(1 )
,
(1 ) 1
m
U x m
h d a
h d a
−
−
−
=
− +
(4)
where 𝛿 = 𝐸𝑆/𝜎2
is the transmit signal-to-noise ratio (SNR).
The 𝑈1 receives then decodes the signal 𝑥1 and 𝑥2 from S with the help of SIC [23]. The received
SNR that 𝑈1 exploits to identify its signal, 𝑥1 is formulated as (5).
1 1
2
, 1 1 1
(1 ) .
m
U x h d a
−
= − (5)
2.2. In second time slot
After decoding signal 𝑥2, 𝑈1 forwards the signal to 𝑈2. Hence, 𝑈2 receives the signal of:
( )
2 1 2
2 2 2 ,
m
U U U
y E d x h n
−
= + (6)
where 𝑛𝑈2
is denoted the additive white Gaussian noise (AWGN) at 𝑈2, with variance 𝑁0. We substitute (3)
into (6) to obtain:
2 2
1 2 1 2 2 .
m m
U U
y d d h h x n
− −
= + (7)
Accordingly, the received SNR at 𝑈2 is expressed as
2 2
2 2
, 1 2 1 2 .
m m
U x h h d d
− −
= (8)
3. PERFORMANCE ANALYSIS
3.1. Outage performance at 𝑈1
In NOMA setup, 𝑈1 is not subject to any outage event 𝑋 on condition that both the 𝑥1 and 𝑥2 that it
receives from 𝑆 are successfully decoded. Hence, with regard to (4) and (5), we can formulate the of 𝑈1
as shown in (9).
( )
1 1 2 2 1 1 1
, , ,
1 Pr , ,
U X U x th U x th
= − (9)
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142
4138
where 𝛾𝑡ℎ1
= 22𝑅𝑈1 − 1 and 𝛾𝑡ℎ2
= 22𝑅𝑈2 − 1. To detect the 𝑥1 and 𝑥2, the target rates 𝑅𝑈1
and 𝑅𝑈2
are
deployed, respectively. The probability function is 𝑃𝑟(. ). In general, the of 𝑈1, deploying 𝑋 protocol, is
expressed in the Theorem 1 as (10),
Theorem 1.
( ) 1
1
1
1 2
,
ln(max , ) 2
1
1 erf ,
2 2 2
h
U X
h
−
= +
(10)
where 1
1
1 1
.
(1 )
th
m
a d
−
=
−
and
( )
2
2
2
1 2 1
(1 )
th
m
th
d a a
−
=
− −
with 2
2 1 th
a a
.
Proof:
We can compute the of 𝑈1 from (11):
( )
( )
( )
( ) ( )
( )
1
2
, 1 1 2
2
1 1 2 1 2
1 Pr max ,
Pr max , max , ,
U X
X
h
h F
= −
= =
(11)
where 𝑋 = |ℎ1|2
. We symbolized the cumulative distribution function (CDF) of the RV 𝑋 as
𝐹𝑋(𝑚𝑎𝑥(𝜔1, 𝜔2)). Because 𝑋 is distributed following log-normal method, the CDF can be expressed as (12).
( )
( )
( )
( ) 1
1
1 2
1 2
ln max , 2
1
max , 1 erf ,
2 2 2
h
X
h
F
−
= +
(12)
where we have the error function erf[.] as shown in (13).
( )
2
0
2
erf( ) exp d
x
x t t
= −
(13)
we substitute (12) into (11) to prove the correctness of the Theorem 1. The proof ends here.
3.2. Outage performance at 2
U
Additionally, 𝑈2 experiences outage event either when 𝑈1 fails to detect 𝑥2 to forward to 𝑈2 or 𝑥2 is
detected but cannot be recovered by 𝑈2. Thus, with regard to (4) and (8), the of 𝑈2 is expressed as (14).
( ) ( )
2 2 1 2 2 2 2 2 1 2 2
, , , ,
Pr Pr , .
U x U x th U x th U x th
= + (14)
Similarly, the of 𝑈2, deploying signal 𝑥2 protocol, as shown in (15).
Theorem 2.
( ) ( )
1
2 2
2
1
1
2
, 2
2
ln( ) 2
1 1
1 exp 1 d ,
2 8
2
h
U x
h
h
x
x
x
−
= + + − +
(15)
where 2
2
2
ln( ) 2
erfc ,
2 2
h
h
−
=
2
2
3
ln 2
erf ,
2 2
h
h
x
−
=
and 2
3
1 2
.
th
m m
d d
− −
=
Proof:
From (14), we can rewrite the 2 2
,
U x as a sum of two probabilities as shown in (16).
5. Int J Elec & Comp Eng ISSN: 2088-8708
Outage performance analysis of non-orthogonal multiple access systems … (Hoang Thien Van)
4139
( ) 2
2 2
1
2
2 2 2
, 1 2 1 2 2 2
1 2 1
Pr Pr , .
=
th
U x m m
h h h
d d h
− −
+
(16)
It is possible to calculate the term 1 from
( ) 1
1
2
2
1 1 2
ln( ) 2
1
Pr 1 erf .
2 2 2
h
h
h
−
= = +
(17)
Additionally, 2 is calculated deploying the probability density function (PDF) and CDF of the
aforementioned 𝑋 and 𝑌 = |ℎ2|2
as shown in (18):
2
2
2
1 2
1
( ) d ,
th
m
X Y m
d
f x F x
x
d
−
−
=
(18)
where
( )
1
1
1
2
2
2
ln( ) 2
( ) exp ,
8
2 2
h
X
h
h
x
f x
x
−
= −
(19)
and
2
2
2
2
1 2
1 2
1
ln 2
1 1
1 erf .
2 2 2
th
h
m m
th
Y m m
h
x
d d
F
x
d d
− −
− −
−
= +
(20)
Finally, (17) and (18) are substituted into (16) to obtain the of 𝑈2, which is (15).
3.3. Total system throughput
It should be noted that for delay-limited transmission mode, the received signal is decoded by the
destination node one block after another. Additionally, we have S transmit information with a constant rate of
𝑅𝑈𝑖
, 𝑖 ∈ (1,2), which is determined by the over log-normal fading channels. For 𝑋 protocol in the delay-
limited transmission mode [21], we have the total system throughput as shown in (21).
( ) ( )
1 1 2 2 2
, ,
1 1 ,
X U X U U x U
R R
= − + − (21)
where 1,
U X and 2 2
,
U x are consecutively taken from Theorem 1 and 2. Besides, we have the target rates
being 𝑅𝑈1
and 𝑅𝑈2
, which are respectively the target rates for 𝑈1, 𝑈2 to detect 𝑥1 and 𝑥2.
4. RESULTS AND DISCUSSION
This section presents the Monte Carlo simulation results of the derived expressions to show how the
PS factor and the SNR affect the system performance in PSR NOMA scenario over log-normal fading
channels. The simulation results are plotted in addition to the analytical results for comparison. For the
simulations, we presume that 𝜂 = 1, 𝑚 = 2, 𝑑1 = 𝑑2 = 2 (m), 𝜎ℎ1
= 𝜎ℎ2
= 4 (𝑑𝐵), 𝜇ℎ1
= 𝜇ℎ2
= 3 (𝑑𝐵).
Moreover, we use the power allocation coefficients of NOMA for 𝑈1 and 𝑈2 being 𝑎1 = 0.2 and 𝑎2 = 0.8,
respectively. Last but not least, we set the target rates as 𝑅𝑈1
= 2 (bps/Hz) and 𝑅𝑈2
= 1 (bps/Hz). Figure 2
shows the versus the PS factor, 𝛼. In general, we can see that the probability that the outage event
happens to 𝑈1 is significantly higher than that of 𝑈2.
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142
4140
The raises constantly to the increase of the PS factor for 𝑈1. However, for 𝑈2, the first
decreases to its minimum value as PS factor approaches (0.45), then rises to its maximum when the PS factor
grows further. Figures 3 and 4 consecutively plot the and the throughput versus the SNR. Specifically, in
Figure 3, it is obvious that the higher the SNR, the lower the O P. Besides, in Figure 4, we can observe that
the throughput-SNR curve of 𝑈1 is remarkably better than that of 𝑈2 starting from SNR=2.5 (dB). Last but
not least, we can see the impact of SNR on the with two different data transmission rates in Figure 5. In
particular, for the lower 𝑅𝑈1
= 𝑅𝑈2
= 𝑅𝑈0
value, the system performs better indicated by the fact that the
-SNR curve converges quicker to the zeroth floor, which indicates 100% success in data transmission. In
closing, we can see that the simulation results fit well the analytical ones showing the accuracy of our derived
expressions.
Figure 2. The performance versus the EH PS
factor
Figure 3. The performance versus the SNR
Figure 4. The throughput of two users versus the
SNR
Figure 5. The versus the SNR with two different
data transmission rates
5. CONCLUSION
In a nutshell, we investigate the and the total throughput for delay-limited transmission mode of
NOMA EH-HD-DF-PSR networks over log-normal fading channels. In general, we can conclude that the
SNR increase will lead to better throughput, which subsequently makes the smaller. Furthermore, the
network performs better with smaller data transmission rate and is more likely to experience outage event as
the PS factor becomes higher.
7. Int J Elec & Comp Eng ISSN: 2088-8708
Outage performance analysis of non-orthogonal multiple access systems … (Hoang Thien Van)
4141
ACKNOWLEDGEMENTS
Thanks for the Saigon International University (SIU) funds supporting this project.
REFERENCES
[1] T. T. H. Ly, H. Sy Nguyen, T. Sang Nguyen, V. V. Huynh, T. Long Nguyen, and M. Voznak, "Outage Probability
Analysis in Relaying Cooperative Systems with NOMA Considering Power Splitting," Symmetry, vol. 11, no.1,
pp. 1-13, 2019, doi: 10.3390/sym11010072.
[2] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan and V. K. Bhargava, "A Survey on Non-Orthogonal
Multiple Access for 5G Networks: Research Challenges and Future Trends," in IEEE Journal on Selected Areas in
Communications, vol. 35, no. 10, pp. 2181-2195, Oct. 2017, doi: 10.1109/JSAC.2017.2725519.
[3] S. M. R. Islam, N. Avazov, O. A. Dobre and K. Kwak, "Power-Domain Non-Orthogonal Multiple Access (NOMA)
in 5G Systems: Potentials and Challenges," in IEEE Communications Surveys & Tutorials, vol. 19, no. 2,
pp. 721-742, Secondquarter 2017, doi: 10.1109/COMST.2016.2621116.
[4] Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan and L. Hanzo, "Non-orthogonal Multiple Access for 5G and
Beyond," Proceedings of the IEEE, vol. 105, no. 12, pp. 2347-2381, 2017, doi: 10.1109/JPROC.2017.2768666.
[5] Y. Sun, D. W. K. Ng, Z. Ding and R. Schober, "Optimal Joint Power and Subcarrier Allocation for Full-Duplex
Multicarrier Non-Orthogonal Multiple Access Systems," in IEEE Transactions on Communications, vol. 65, no. 3,
pp. 1077-1091, Mar. 2017, doi: 10.1109/TCOMM.2017.2650992.
[6] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao and L. Hanzo, "Enhancing the Physical Layer Security of Non-Orthogonal
Multiple Access in Large-Scale Networks," in IEEE Transactions on Wireless Communications, vol. 16, no. 3,
pp. 1656-1672, Mar. 2017, doi: 10.1109/TWC.2017.2650987.
[7] Z. Yang, Z. Ding, P. Fan and N. Al-Dhahir, "A General Power Allocation Scheme to Guarantee Quality of Service
in Downlink and Uplink NOMA Systems," in IEEE Transactions on Wireless Communications, vol. 15, no. 11,
pp. 7244-7257, Nov. 2016, doi: 10.1109/TWC.2016.2599521.
[8] X. Lu, P. Wang, D. Niyato and Z. Han, "Resource allocation in wireless networks with RF energy harvesting and
transfer," in IEEE Network, vol. 29, no. 6, pp. 68-75, Nov.-Dec. 2015, doi: 10.1109/MNET.2015.7340427.
[9] A. Ghasempour, “Internet of Things in Smart Grid: Architecture, Applications, Services, Key Technologies, and
Challenges,” Inventions journal, vol. 4, no. 1, pp. 1-12, 2019, doi: 10.3390/inventions4010022.
[10] E. Boshkovska, D. W. K. Ng, N. Zlatanov and R. Schober, "Practical Non-Linear Energy Harvesting Model and
Resource Allocation for SWIPT Systems," in IEEE Communications Letters, vol. 19, no. 12, pp. 2082-2085, Dec.
2015, doi: 10.1109/LCOMM.2015.2478460.
[11] Y. Zeng and R. Zhang, "Full-Duplex Wireless-Powered Relay With Self-Energy Recycling," in IEEE Wireless
Communications Letters, vol. 4, no. 2, pp. 201-204, Apr. 2015, doi: 10.1109/LWC.2015.2396516.
[12] T. D. Ponnimbaduge Perera, D. N. K. Jayakody, S. K. Sharma, S. Chatzinotas and J. Li, "Simultaneous Wireless
Information and Power Transfer (SWIPT): Recent Advances and Future Challenges," in IEEE Communications
Surveys & Tutorials, vol. 20, no. 1, pp. 264-302, Firstquarter 2018, doi: 10.1109/COMST.2017.2783901.
[13] A. Ibrahim., M. Iskandar, M. Salem, L. Awalin, A. Jusoh, and T. Sutikno, "Application of inductive coupling for
wireless power transfer," International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 11, no. 3,
pp. 1109-1116, 2020, doi: 10.11591/ijpeds.v11.i3.pp1109-1116.
[14] M. S. Tamrin and M. R. Ahmad, "Simulation of adaptive power management circuit for hybrid energy harvester
and real-time sensing application," International Journal of Power Electronics and Drive Systems (IJPEDS),
vol. 11, no. 2, pp. 656-666, 2020, doi: 10.11591/ijpeds.v11.i2.pp658-666.
[15] H.-S. Nguyen, D.-T. Do, and M. Voznak, "Two-way relaying networks in green communications for 5G: Optimal
throughput and trade off between relay distance on power splitting-based and time switching-based relaying
SWIPT," AEU-International Journal of Electronics and Communications, vol. 70, no. 12, pp. 1637-1644, 2016,
doi: 10.1016/j.aeue.2016.10.002.
[16] H.-S. Nguyen., D.-T. Do, T.-S. Nguyen, and M. Voznak, "Exploiting hybrid time switching-based and power
splitting-based relaying protocol inwireless powered communication networks with outdated channel state
information," Automatika, vol. 58, no. 1, pp. 111-118, 2017, doi: 10.1080/00051144.2017.1372124.
[17] Y. Ye, Y. Li, F. Zhou, N. Al-Dhahir and H. Zhang, "Power Splitting-Based SWIPT With Dual-Hop DF Relaying in
the Presence of a Direct Link," in IEEE Systems Journal, vol. 13, no. 2, pp. 1316-1319, Jun. 2019,
doi: 10.1109/JSYST.2018.2850944.
[18] H. Nguyen, A. Bui, D. Do and M. Voznak, "Imperfect channel state information of AF and DF energy harvesting
cooperative networks," in China Communications, vol. 13, no. 10, pp. 11-19, Oct. 2016,
doi: 10.1109/CC.2016.7732008.
[19] Y. Feng, V. C. M. Leung and F. Ji, "Performance Study for SWIPT Cooperative Communication Systems in
Shadowed Nakagami Fading Channels," in IEEE Transactions on Wireless Communications, vol. 17, no. 2,
pp. 1199-1211, Feb. 2018, doi: 10.1109/TWC.2017.2776933.
[20] H.-S. Nguyen, T.-S. Nguyen, V.-T. Vo, and M. Voznak, ”Hybrid full-duplex/half-duplex relay selection scheme
with optimal power under individual power constraints and energy harvesting,” Computer Communications,
vol. 124, pp. 31-44, 2018, doi: 10.1016/j.comcom.2018.04.014.
[21] Y. Ye, Y. Li, L. Shi, R. Q. Hu and H. Zhang, "Improved Hybrid Relaying Protocol for DF Relaying in the Presence
of a Direct Link," in IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 173-176, Feb. 2019,
doi: 10.1109/LWC.2018.2865476.
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142
4142
[22] N. T. Do, D. B. Da Costa, T. Q. Duong and B. An, "A BNBF User Selection Scheme for NOMA-Based
Cooperative Relaying Systems With SWIPT," in IEEE Communications Letters, vol. 21, no. 3, pp. 664-667, Mar.
2017, doi: 10.1109/LCOMM.2016.2631606.
[23] H.-S. Nguyen.,T. T. Hoc Ly, T.-S. Nguyen, T.-L. Nguyen, and M. Voznak, "Outage performance analysis and
SWIPT optimization in energy-harvesting wireless sensor network deploying NOMA," Sensors, vol. 19, no. 3,
pp. 1-21, 2019, doi: 10.3390/s19030613.
[24] O. Abbasi, A. Ebrahimi and N. Mokari, "NOMA Inspired Cooperative Relaying System Using an AF Relay," in
IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 261-264, Feb. 2019, doi: 10.1109/LWC.2018.2869592.
[25] H. Hashemi, "The indoor radio propagation channel," in Proceedings of the IEEE, vol. 81, no. 7, pp. 943-968, Jul.
1993, doi: 10.1109/5.231342.
[26] A. Laourine, A. Stephenne and S. Affes, "On the capacity of log-normal fading channels," in IEEE Transactions on
Communications, vol. 57, no. 6, pp. 1603-1607, Jun. 2009, doi: 10.1109/TCOMM.2009.06.070109.
[27] H. Nouri, F. Touati and M. Uysal, "Diversity-Multiplexing Tradeoff for Log-Normal Fading Channels," in IEEE
Transactions on Communications, vol. 64, no. 7, pp. 3119-3129, Jul. 2016, doi: 10.1109/TCOMM.2016.2575019.
[28] K. M. Rabie, A. Salem, E. Alsusa and M. Alouini, "Energy-harvesting in cooperative AF relaying networks over
log-normal fading channels," 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur,
Malaysia, 2016, pp. 1-7, doi: 10.1109/ICC.2016.7511559.
[29] K. M. Rabie, B. Adebisi and M. Alouini, "Half-Duplex and Full-Duplex AF and DF Relaying With Energy-
Harvesting in Log-Normal Fading," in IEEE Transactions on Green Communications and Networking, vol. 1,
no. 4, pp. 468-480, Dec. 2017, doi: 10.1109/TGCN.2017.2740258.
[30] R. Katla and A. V. Babu, "Dual-hop full duplex relay networks over composite fading channels: Power and
locationoptimization," Physical Communication, vol. 30, pp. 1-14, 2018, doi: 10.1016/j.phycom.2018.07.009.
[31] Y. Liu, R. Xiao, J. Shen, and H. Yang, "Hybrid protocol for wireless energy harvesting network over log-normal
fading channel," The Journal of Engineering, vol. 2018, no. 6, pp. 339-341, 2018, doi: 10.1049/joe.2017.0892.