SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 11, No. 5, October 2021, pp. 4135~4142
ISSN: 2088-8708, DOI: 10.11591/ijece.v11i5.pp4135-4142  4135
Journal homepage: http://ijece.iaescore.com
Outage performance analysis of non-orthogonal multiple access
systems with RF energy harvesting
Hoang Thien Van1
, Vo Tien Anh2
, Danh Hong Le3
, Ma Quoc Phu4
, Hoang-Sy Nguyen5
1,2
The Saigon International University (SIU), Ho Chi Minh City, Vietnam
3
Van Hien University, Ho Chi Minh City, Vietnam
4
Binh Duong University, Thu Dau Mot City, Binh Duong Province, Vietnam
5
Eastem International University, Binh Duong Province, Vietnam
Article Info ABSTRACT
Article history:
Received Aug 16, 2020
Revised Mar 4, 2021
Accepted Mar 15, 2021
Non-orthogonal multiple access (NOMA) has drawn enormous attention
from the research community as a promising technology for future wireless
communications with increasing demands of capacity and throughput.
Especially, in the light of fifth-generation (5G) communication where
multiple internet-of-things (IoT) devices are connected, the application of
NOMA to indoor wireless networks has become more interesting to study. In
view of this, we investigate the NOMA technique in energy harvesting (EH)
half-duplex (HD) decode-and-forward (DF) power-splitting relaying (PSR)
networks over indoor scenarios which are characterized by log-normal fading
channels. The system performance of such networks is evaluated in terms of
outage probability (OP) and total throughput for delay-limited transmission
mode whose expressions are derived herein. In general, we can see in details
how different system parameters affect such networks thanks to the results
from Monte Carlo simulations. For illustrating the accuracy of our analytical
results, we plot them along with the theoretical ones for comparison.
Keywords:
Delay-limited transmission
Energy harvesting
Log-normal fading
NOMA
Outage probability
PSR-based protocol
This is an open access article under the CC BY-SA license.
Corresponding Author:
Danh Hong Le
Van Hien University
Ho Chi Minh City, Vietnam
Email: danhlh@vhu.edu.vn
1. INTRODUCTION
NOMA technology is well-known because of its ability to serve multiple users exploiting the same
resource block [1], [2]. Additionally, we can find in the existing literature the principal elements of NOMA,
which have been well investigated, such as superposition coding, successive interference cancellation (SIC).
Thus, it is needless to mention the convenience of deploying NOMA for the massive connectivity need of 5G
and IoT applications, [3]-[8]. Besides, simultaneous wireless information and power transfer (SWIPT)
systems, as the name suggests, exploit the radio frequency (RF) for EH and transferring data to power finite-
capacity batteries in wireless relaying networks, [9]-[14]. Indeed, we can find a wide range of studies relating
to EH relaying networks for outdoor scenarios in [15]-[24]. Specifically, in [15]-[17], the two relaying
protocols namely power splitting-based (PS) and time switching-based (TS) and their hybrid version in
cooperative relaying networks were studied. Additionally, two relay operation modes so-called amplify-and-
forward (AF) and decode-forward (DF) were investigated in [18]. Especially in [22]-[24], the authors
analyzed the system performance of SWIPT networks in the context of NOMA. On the contrary, despite
being excellent in modelling the indoor fading variations caused by building walls and moving objects
[25]-[27], log-normal fading channels are not studied that intensively comparing to common fading channels
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142
4136
such as Rayleigh, Nakagami-m. Among the rare study pieces concerning indoor log-normal fading, there
were [28-31]. Motivated by the above works, in this paper, we investigate the outage performance of NOMA
EH-HD-DF-PSR networks. Differing itself from the existing works, we analyze the networks in indoor
scenarios which we model with log-normal fading channels. In section 2, we describe the system model.
Section 3 presents the and throughput analytical expressions of the in-studied networks. In section 4, we
discuss the simulation results from the derived expressions. Finally, section 5 concludes our paper.
2. SYSTEM MODEL
Depicted in Figure 1(a) is the in-studied system model whereas a source (𝑆) attempts to transmit
data to two user devices denoted as 𝑈1 and 𝑈2. However, we can see that the 𝑆 → 𝑈2 communication link
cannot be realized because of the in-between obstacle. Thereby, 𝑈1 is employed to relay the data transmitted
from 𝑆 to 𝑈2. It should be noted that 𝑈1 operates in DF mode and is energized by EH the signal that 𝑆 sends.
The 𝑆 → 𝑈1 and 𝑈1 → 𝑈2 distances are denoted with 𝑑1 and 𝑑2, and assigned with complex channel
coefficients of ℎ1 and ℎ2, respectively. Besides, there are two random variables (RVs) denoted as |ℎ1|2
and
|ℎ2|2
. The two RVs are independently and identically distributed (i.i.d) over the time block in the log-normal
distribution manner, with parameters 𝐿𝑁(𝜇ℎ1
, 𝜎ℎ1
2
) and 𝐿𝑁(𝜇ℎ2
, 𝜎ℎ2
2
), respectively. Additionally, we have 𝜇ℎ1
is the mean value of 10 log(|ℎ1|2), and 𝜎ℎ𝑖
2
is the standard deviation of 10 log(|ℎ𝑖|2), 𝑖 ∈ {1,2}. With regard
to Figure 1(b), we can see the PSR protocol that 𝑈1 employs in this study for EH and information
transmission (IT) over the time block 𝑇. Specifically, we have 𝑇 divided into two 𝑇/2 blocks with details
below.
(a)
(b)
Figure 1. This figure are; (a) System model, (b) PSR protocol
2.1. In first time slot
During the first time slot 𝑇/2, 𝑆 transmits data with a transmission power of 𝐸𝑠 to 𝑈1. The second
time slot, remaining 𝑇/2, is used for IT from 𝑈1 to 𝑈2. As aforementioned, PSR protocol 𝑈1 separates the 𝐸𝑠
to two portions for EH and IT purposes. We denote the power splitting (PS) ratio as 𝛼, 0 < 𝛼 < 1. Thereby,
at 𝑈1, the energy amount from EH process is:
2
1 1 ( / 2),
m
H S
E h d E T
 −
= (1)
Int J Elec & Comp Eng ISSN: 2088-8708 
Outage performance analysis of non-orthogonal multiple access systems … (Hoang Thien Van)
4137
where 0 < 𝜂 < 1 is the EH efficiency at the energy receiver, determined by the rectifier and EH circuitry that
𝑈1 deploys. Employing the superposition property of S's transmit signal in NOMA scheme
[1, 2], the received signal at 𝑈1 is expressed as shown in (2).
( )
1 1
1 1 1 1 2 1 2 ,
m m
U S S U
y h a E d x a E d x n
− −
= + + (2)
where we have 𝑎1 and 𝑎2 are, respectively, the power allocation coefficients of target signal 𝑥1and 𝑥2 that 𝑆
attempts to send to 𝑈1 and 𝑈2. Besides, we have the additive white Gaussian noise (AWGN) at 𝑈1, which is
𝑛𝑈1
, with variance 𝑁0. We assume that 𝐸[𝑥1
2] = 𝐸[𝑥2
2] = 1. Since 𝑈2 is further from S than 𝑈1, it is allocated
with more power. Thus, we have 𝑎2 > 𝑎1 > 0, which satisfies 𝑎1 + 𝑎2 = 1. Additionally, the 𝑈1 consumes a
portion of the energy harvested for its operation while the rest is utilized for DF the received signal to 𝑈2.
Thereby, we can express the transmission power at 𝑈1with regard to the harvested energy 𝐸𝐻 as shown in (3).
1
2
2
1 1
1 1
( / 2)
.
( / 2) ( / 2)
m
S m
H
U S
h d E T
E
E h d E
T T


−
−
= = = (3)
Considering (2), we have the received signal-to-interference-plus-noise ratio (SINR) at 𝑈1 for
detecting the signal 𝑥2 of 𝑈2 formulated in (4).
1 2
2
1 1 2
, 2
1 1 1
(1 )
,
(1 ) 1
m
U x m
h d a
h d a
 

 
−
−
−
=
− +
(4)
where 𝛿 = 𝐸𝑆/𝜎2
is the transmit signal-to-noise ratio (SNR).
The 𝑈1 receives then decodes the signal 𝑥1 and 𝑥2 from S with the help of SIC [23]. The received
SNR that 𝑈1 exploits to identify its signal, 𝑥1 is formulated as (5).
1 1
2
, 1 1 1
(1 ) .
m
U x h d a
  
−
= − (5)
2.2. In second time slot
After decoding signal 𝑥2, 𝑈1 forwards the signal to 𝑈2. Hence, 𝑈2 receives the signal of:
( )
2 1 2
2 2 2 ,
m
U U U
y E d x h n
−
= + (6)
where 𝑛𝑈2
is denoted the additive white Gaussian noise (AWGN) at 𝑈2, with variance 𝑁0. We substitute (3)
into (6) to obtain:
2 2
1 2 1 2 2 .
m m
U U
y d d h h x n
 
− −
= + (7)
Accordingly, the received SNR at 𝑈2 is expressed as
2 2
2 2
, 1 2 1 2 .
m m
U x h h d d
 
− −
= (8)
3. PERFORMANCE ANALYSIS
3.1. Outage performance at 𝑈1
In NOMA setup, 𝑈1 is not subject to any outage event 𝑋 on condition that both the 𝑥1 and 𝑥2 that it
receives from 𝑆 are successfully decoded. Hence, with regard to (4) and (5), we can formulate the of 𝑈1
as shown in (9).
( )
1 1 2 2 1 1 1
, , ,
1 Pr , ,
U X U x th U x th
   
= −   (9)
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142
4138
where 𝛾𝑡ℎ1
= 22𝑅𝑈1 − 1 and 𝛾𝑡ℎ2
= 22𝑅𝑈2 − 1. To detect the 𝑥1 and 𝑥2, the target rates 𝑅𝑈1
and 𝑅𝑈2
are
deployed, respectively. The probability function is 𝑃𝑟(. ). In general, the of 𝑈1, deploying 𝑋 protocol, is
expressed in the Theorem 1 as (10),
Theorem 1.
( ) 1
1
1
1 2
,
ln(max , ) 2
1
1 erf ,
2 2 2
h
U X
h
   

 
 
−
 
 
= +
 
 
 
 
(10)
where 1
1
1 1
.
(1 )
th
m
a d


 
−
=
−
and
( )
2
2
2
1 2 1
(1 )
th
m
th
d a a


  
−
=
− −
with 2
2 1 th
a a 
 .
Proof:
We can compute the of 𝑈1 from (11):
( )
( )
( )
( ) ( )
( )
1
2
, 1 1 2
2
1 1 2 1 2
1 Pr max ,
Pr max , max , ,
U X
X
h
h F
 
   
= − 
=  =
(11)
where 𝑋 = |ℎ1|2
. We symbolized the cumulative distribution function (CDF) of the RV 𝑋 as
𝐹𝑋(𝑚𝑎𝑥(𝜔1, 𝜔2)). Because 𝑋 is distributed following log-normal method, the CDF can be expressed as (12).
( )
( )
( )
( ) 1
1
1 2
1 2
ln max , 2
1
max , 1 erf ,
2 2 2
h
X
h
F
   
 

 
 
−
 
 
= +
 
 
 
 
(12)
where we have the error function erf[.] as shown in (13).
( )
2
0
2
erf( ) exp d
x
x t t

= −
 (13)
we substitute (12) into (11) to prove the correctness of the Theorem 1. The proof ends here.
3.2. Outage performance at 2
U
Additionally, 𝑈2 experiences outage event either when 𝑈1 fails to detect 𝑥2 to forward to 𝑈2 or 𝑥2 is
detected but cannot be recovered by 𝑈2. Thus, with regard to (4) and (8), the of 𝑈2 is expressed as (14).
( ) ( )
2 2 1 2 2 2 2 2 1 2 2
, , , ,
Pr Pr , .
U x U x th U x th U x th
     
=  +   (14)
Similarly, the of 𝑈2, deploying signal 𝑥2 protocol, as shown in (15).
Theorem 2.
( ) ( )
1
2 2
2
1
1
2
, 2
2
ln( ) 2
1 1
1 exp 1 d ,
2 8
2
h
U x
h
h
x
x
x

 




 
 
−
 
 
= + + − +
 
 
 
 
 
 
 (15)
where 2
2
2
ln( ) 2
erfc ,
2 2
h
h
  

 
−
 
=
 
 
2
2
3
ln 2
erf ,
2 2
h
h
x

 

 
 
−
 
 
 
 
=
 
 
 
and 2
3
1 2
.
th
m m
d d


 − −
=
Proof:
From (14), we can rewrite the 2 2
,
U x as a sum of two probabilities as shown in (16).
Int J Elec & Comp Eng ISSN: 2088-8708 
Outage performance analysis of non-orthogonal multiple access systems … (Hoang Thien Van)
4139
( ) 2
2 2
1
2
2 2 2
, 1 2 1 2 2 2
1 2 1
Pr Pr , .
=
th
U x m m
h h h
d d h

 
 − −
 
 
 +  
 
 
(16)
It is possible to calculate the term 1 from
( ) 1
1
2
2
1 1 2
ln( ) 2
1
Pr 1 erf .
2 2 2
h
h
h
  


 
 
−
 
 
=  = +
 
 
 
 
(17)
Additionally, 2 is calculated deploying the probability density function (PDF) and CDF of the
aforementioned 𝑋 and 𝑌 = |ℎ2|2
as shown in (18):
2
2
2
1 2
1
( ) d ,
th
m
X Y m
d
f x F x
x
d


 −
−
  
=  
 
 
 (18)
where
( )
1
1
1
2
2
2
ln( ) 2
( ) exp ,
8
2 2
h
X
h
h
x
f x
x
 



 
−
 
= −
 
 
 
(19)
and
2
2
2
2
1 2
1 2
1
ln 2
1 1
1 erf .
2 2 2
th
h
m m
th
Y m m
h
x
d d
F
x
d d

 
 
 
− −
− −
 
 
 
 
−
 
 
 
   
 
 
= +
   
 
 
   
 
 
 
 
 
(20)
Finally, (17) and (18) are substituted into (16) to obtain the of 𝑈2, which is (15).
3.3. Total system throughput
It should be noted that for delay-limited transmission mode, the received signal is decoded by the
destination node one block after another. Additionally, we have S transmit information with a constant rate of
𝑅𝑈𝑖
, 𝑖 ∈ (1,2), which is determined by the over log-normal fading channels. For 𝑋 protocol in the delay-
limited transmission mode [21], we have the total system throughput as shown in (21).
( ) ( )
1 1 2 2 2
, ,
1 1 ,
X U X U U x U
R R
 = − + − (21)
where 1,
U X and 2 2
,
U x are consecutively taken from Theorem 1 and 2. Besides, we have the target rates
being 𝑅𝑈1
and 𝑅𝑈2
, which are respectively the target rates for 𝑈1, 𝑈2 to detect 𝑥1 and 𝑥2.
4. RESULTS AND DISCUSSION
This section presents the Monte Carlo simulation results of the derived expressions to show how the
PS factor and the SNR affect the system performance in PSR NOMA scenario over log-normal fading
channels. The simulation results are plotted in addition to the analytical results for comparison. For the
simulations, we presume that 𝜂 = 1, 𝑚 = 2, 𝑑1 = 𝑑2 = 2 (m), 𝜎ℎ1
= 𝜎ℎ2
= 4 (𝑑𝐵), 𝜇ℎ1
= 𝜇ℎ2
= 3 (𝑑𝐵).
Moreover, we use the power allocation coefficients of NOMA for 𝑈1 and 𝑈2 being 𝑎1 = 0.2 and 𝑎2 = 0.8,
respectively. Last but not least, we set the target rates as 𝑅𝑈1
= 2 (bps/Hz) and 𝑅𝑈2
= 1 (bps/Hz). Figure 2
shows the versus the PS factor, 𝛼. In general, we can see that the probability that the outage event
happens to 𝑈1 is significantly higher than that of 𝑈2.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142
4140
The raises constantly to the increase of the PS factor for 𝑈1. However, for 𝑈2, the first
decreases to its minimum value as PS factor approaches (0.45), then rises to its maximum when the PS factor
grows further. Figures 3 and 4 consecutively plot the and the throughput versus the SNR. Specifically, in
Figure 3, it is obvious that the higher the SNR, the lower the O P. Besides, in Figure 4, we can observe that
the throughput-SNR curve of 𝑈1 is remarkably better than that of 𝑈2 starting from SNR=2.5 (dB). Last but
not least, we can see the impact of SNR on the with two different data transmission rates in Figure 5. In
particular, for the lower 𝑅𝑈1
= 𝑅𝑈2
= 𝑅𝑈0
value, the system performs better indicated by the fact that the
-SNR curve converges quicker to the zeroth floor, which indicates 100% success in data transmission. In
closing, we can see that the simulation results fit well the analytical ones showing the accuracy of our derived
expressions.
Figure 2. The performance versus the EH PS
factor
Figure 3. The performance versus the SNR
Figure 4. The throughput of two users versus the
SNR
Figure 5. The versus the SNR with two different
data transmission rates
5. CONCLUSION
In a nutshell, we investigate the and the total throughput for delay-limited transmission mode of
NOMA EH-HD-DF-PSR networks over log-normal fading channels. In general, we can conclude that the
SNR increase will lead to better throughput, which subsequently makes the smaller. Furthermore, the
network performs better with smaller data transmission rate and is more likely to experience outage event as
the PS factor becomes higher.
Int J Elec & Comp Eng ISSN: 2088-8708 
Outage performance analysis of non-orthogonal multiple access systems … (Hoang Thien Van)
4141
ACKNOWLEDGEMENTS
Thanks for the Saigon International University (SIU) funds supporting this project.
REFERENCES
[1] T. T. H. Ly, H. Sy Nguyen, T. Sang Nguyen, V. V. Huynh, T. Long Nguyen, and M. Voznak, "Outage Probability
Analysis in Relaying Cooperative Systems with NOMA Considering Power Splitting," Symmetry, vol. 11, no.1,
pp. 1-13, 2019, doi: 10.3390/sym11010072.
[2] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan and V. K. Bhargava, "A Survey on Non-Orthogonal
Multiple Access for 5G Networks: Research Challenges and Future Trends," in IEEE Journal on Selected Areas in
Communications, vol. 35, no. 10, pp. 2181-2195, Oct. 2017, doi: 10.1109/JSAC.2017.2725519.
[3] S. M. R. Islam, N. Avazov, O. A. Dobre and K. Kwak, "Power-Domain Non-Orthogonal Multiple Access (NOMA)
in 5G Systems: Potentials and Challenges," in IEEE Communications Surveys & Tutorials, vol. 19, no. 2,
pp. 721-742, Secondquarter 2017, doi: 10.1109/COMST.2016.2621116.
[4] Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan and L. Hanzo, "Non-orthogonal Multiple Access for 5G and
Beyond," Proceedings of the IEEE, vol. 105, no. 12, pp. 2347-2381, 2017, doi: 10.1109/JPROC.2017.2768666.
[5] Y. Sun, D. W. K. Ng, Z. Ding and R. Schober, "Optimal Joint Power and Subcarrier Allocation for Full-Duplex
Multicarrier Non-Orthogonal Multiple Access Systems," in IEEE Transactions on Communications, vol. 65, no. 3,
pp. 1077-1091, Mar. 2017, doi: 10.1109/TCOMM.2017.2650992.
[6] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao and L. Hanzo, "Enhancing the Physical Layer Security of Non-Orthogonal
Multiple Access in Large-Scale Networks," in IEEE Transactions on Wireless Communications, vol. 16, no. 3,
pp. 1656-1672, Mar. 2017, doi: 10.1109/TWC.2017.2650987.
[7] Z. Yang, Z. Ding, P. Fan and N. Al-Dhahir, "A General Power Allocation Scheme to Guarantee Quality of Service
in Downlink and Uplink NOMA Systems," in IEEE Transactions on Wireless Communications, vol. 15, no. 11,
pp. 7244-7257, Nov. 2016, doi: 10.1109/TWC.2016.2599521.
[8] X. Lu, P. Wang, D. Niyato and Z. Han, "Resource allocation in wireless networks with RF energy harvesting and
transfer," in IEEE Network, vol. 29, no. 6, pp. 68-75, Nov.-Dec. 2015, doi: 10.1109/MNET.2015.7340427.
[9] A. Ghasempour, “Internet of Things in Smart Grid: Architecture, Applications, Services, Key Technologies, and
Challenges,” Inventions journal, vol. 4, no. 1, pp. 1-12, 2019, doi: 10.3390/inventions4010022.
[10] E. Boshkovska, D. W. K. Ng, N. Zlatanov and R. Schober, "Practical Non-Linear Energy Harvesting Model and
Resource Allocation for SWIPT Systems," in IEEE Communications Letters, vol. 19, no. 12, pp. 2082-2085, Dec.
2015, doi: 10.1109/LCOMM.2015.2478460.
[11] Y. Zeng and R. Zhang, "Full-Duplex Wireless-Powered Relay With Self-Energy Recycling," in IEEE Wireless
Communications Letters, vol. 4, no. 2, pp. 201-204, Apr. 2015, doi: 10.1109/LWC.2015.2396516.
[12] T. D. Ponnimbaduge Perera, D. N. K. Jayakody, S. K. Sharma, S. Chatzinotas and J. Li, "Simultaneous Wireless
Information and Power Transfer (SWIPT): Recent Advances and Future Challenges," in IEEE Communications
Surveys & Tutorials, vol. 20, no. 1, pp. 264-302, Firstquarter 2018, doi: 10.1109/COMST.2017.2783901.
[13] A. Ibrahim., M. Iskandar, M. Salem, L. Awalin, A. Jusoh, and T. Sutikno, "Application of inductive coupling for
wireless power transfer," International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 11, no. 3,
pp. 1109-1116, 2020, doi: 10.11591/ijpeds.v11.i3.pp1109-1116.
[14] M. S. Tamrin and M. R. Ahmad, "Simulation of adaptive power management circuit for hybrid energy harvester
and real-time sensing application," International Journal of Power Electronics and Drive Systems (IJPEDS),
vol. 11, no. 2, pp. 656-666, 2020, doi: 10.11591/ijpeds.v11.i2.pp658-666.
[15] H.-S. Nguyen, D.-T. Do, and M. Voznak, "Two-way relaying networks in green communications for 5G: Optimal
throughput and trade off between relay distance on power splitting-based and time switching-based relaying
SWIPT," AEU-International Journal of Electronics and Communications, vol. 70, no. 12, pp. 1637-1644, 2016,
doi: 10.1016/j.aeue.2016.10.002.
[16] H.-S. Nguyen., D.-T. Do, T.-S. Nguyen, and M. Voznak, "Exploiting hybrid time switching-based and power
splitting-based relaying protocol inwireless powered communication networks with outdated channel state
information," Automatika, vol. 58, no. 1, pp. 111-118, 2017, doi: 10.1080/00051144.2017.1372124.
[17] Y. Ye, Y. Li, F. Zhou, N. Al-Dhahir and H. Zhang, "Power Splitting-Based SWIPT With Dual-Hop DF Relaying in
the Presence of a Direct Link," in IEEE Systems Journal, vol. 13, no. 2, pp. 1316-1319, Jun. 2019,
doi: 10.1109/JSYST.2018.2850944.
[18] H. Nguyen, A. Bui, D. Do and M. Voznak, "Imperfect channel state information of AF and DF energy harvesting
cooperative networks," in China Communications, vol. 13, no. 10, pp. 11-19, Oct. 2016,
doi: 10.1109/CC.2016.7732008.
[19] Y. Feng, V. C. M. Leung and F. Ji, "Performance Study for SWIPT Cooperative Communication Systems in
Shadowed Nakagami Fading Channels," in IEEE Transactions on Wireless Communications, vol. 17, no. 2,
pp. 1199-1211, Feb. 2018, doi: 10.1109/TWC.2017.2776933.
[20] H.-S. Nguyen, T.-S. Nguyen, V.-T. Vo, and M. Voznak, ”Hybrid full-duplex/half-duplex relay selection scheme
with optimal power under individual power constraints and energy harvesting,” Computer Communications,
vol. 124, pp. 31-44, 2018, doi: 10.1016/j.comcom.2018.04.014.
[21] Y. Ye, Y. Li, L. Shi, R. Q. Hu and H. Zhang, "Improved Hybrid Relaying Protocol for DF Relaying in the Presence
of a Direct Link," in IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 173-176, Feb. 2019,
doi: 10.1109/LWC.2018.2865476.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142
4142
[22] N. T. Do, D. B. Da Costa, T. Q. Duong and B. An, "A BNBF User Selection Scheme for NOMA-Based
Cooperative Relaying Systems With SWIPT," in IEEE Communications Letters, vol. 21, no. 3, pp. 664-667, Mar.
2017, doi: 10.1109/LCOMM.2016.2631606.
[23] H.-S. Nguyen.,T. T. Hoc Ly, T.-S. Nguyen, T.-L. Nguyen, and M. Voznak, "Outage performance analysis and
SWIPT optimization in energy-harvesting wireless sensor network deploying NOMA," Sensors, vol. 19, no. 3,
pp. 1-21, 2019, doi: 10.3390/s19030613.
[24] O. Abbasi, A. Ebrahimi and N. Mokari, "NOMA Inspired Cooperative Relaying System Using an AF Relay," in
IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 261-264, Feb. 2019, doi: 10.1109/LWC.2018.2869592.
[25] H. Hashemi, "The indoor radio propagation channel," in Proceedings of the IEEE, vol. 81, no. 7, pp. 943-968, Jul.
1993, doi: 10.1109/5.231342.
[26] A. Laourine, A. Stephenne and S. Affes, "On the capacity of log-normal fading channels," in IEEE Transactions on
Communications, vol. 57, no. 6, pp. 1603-1607, Jun. 2009, doi: 10.1109/TCOMM.2009.06.070109.
[27] H. Nouri, F. Touati and M. Uysal, "Diversity-Multiplexing Tradeoff for Log-Normal Fading Channels," in IEEE
Transactions on Communications, vol. 64, no. 7, pp. 3119-3129, Jul. 2016, doi: 10.1109/TCOMM.2016.2575019.
[28] K. M. Rabie, A. Salem, E. Alsusa and M. Alouini, "Energy-harvesting in cooperative AF relaying networks over
log-normal fading channels," 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur,
Malaysia, 2016, pp. 1-7, doi: 10.1109/ICC.2016.7511559.
[29] K. M. Rabie, B. Adebisi and M. Alouini, "Half-Duplex and Full-Duplex AF and DF Relaying With Energy-
Harvesting in Log-Normal Fading," in IEEE Transactions on Green Communications and Networking, vol. 1,
no. 4, pp. 468-480, Dec. 2017, doi: 10.1109/TGCN.2017.2740258.
[30] R. Katla and A. V. Babu, "Dual-hop full duplex relay networks over composite fading channels: Power and
locationoptimization," Physical Communication, vol. 30, pp. 1-14, 2018, doi: 10.1016/j.phycom.2018.07.009.
[31] Y. Liu, R. Xiao, J. Shen, and H. Yang, "Hybrid protocol for wireless energy harvesting network over log-normal
fading channel," The Journal of Engineering, vol. 2018, no. 6, pp. 339-341, 2018, doi: 10.1049/joe.2017.0892.

More Related Content

What's hot

Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksComparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
TELKOMNIKA JOURNAL
 
Lecture Notes: EEEC6440315 Communication Systems - Spectral Efficiency
Lecture Notes:  EEEC6440315 Communication Systems - Spectral EfficiencyLecture Notes:  EEEC6440315 Communication Systems - Spectral Efficiency
Lecture Notes: EEEC6440315 Communication Systems - Spectral Efficiency
AIMST University
 
Relay lte
Relay lteRelay lte
Tham khao ofdm tutorial
Tham khao ofdm tutorialTham khao ofdm tutorial
Tham khao ofdm tutorial
Trần Đức Mạnh
 
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksMultiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Panimalar Engineering College
 
Wc nots final unit new 7
Wc nots final unit new  7Wc nots final unit new  7
Wc nots final unit new 7
SURESHA V
 
Cellular Networks
Cellular NetworksCellular Networks
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
Sukhvinder Singh Malik
 
15082005174118 wca article-vfinal
15082005174118 wca article-vfinal15082005174118 wca article-vfinal
15082005174118 wca article-vfinalsunilareddyk
 
Popular Interview Wireless Question with Answer
Popular Interview Wireless Question with AnswerPopular Interview Wireless Question with Answer
Popular Interview Wireless Question with Answer
VARUN KUMAR
 
OFDMA principles
OFDMA principlesOFDMA principles
OFDMA principles
Steve Fowlkes
 
MIMO Channel Capacity
MIMO Channel CapacityMIMO Channel Capacity
MIMO Channel Capacity
Pei-Che Chang
 
OFDMA
OFDMAOFDMA
Introduction to communication system lecture2
Introduction to communication system lecture2Introduction to communication system lecture2
Introduction to communication system lecture2
Jumaan Ally Mohamed
 
FDM,OFDM,OFDMA,MIMO
FDM,OFDM,OFDMA,MIMOFDM,OFDM,OFDMA,MIMO
FDM,OFDM,OFDMA,MIMO
Nadeem Rana
 
Bit Error rate of QAM
Bit Error rate of QAMBit Error rate of QAM
Bit Error rate of QAM
AWANISHKUMAR84
 
WC & LTE 4G Broadband Module 2- 2019 by Prof.Suresha V
WC & LTE 4G Broadband  Module 2- 2019 by Prof.Suresha VWC & LTE 4G Broadband  Module 2- 2019 by Prof.Suresha V
WC & LTE 4G Broadband Module 2- 2019 by Prof.Suresha V
SURESHA V
 
SCFDMA
SCFDMASCFDMA
SCFDMA
Sneha Dubey
 
Lte antennas for 17EC81
Lte antennas for 17EC81Lte antennas for 17EC81
Lte antennas for 17EC81
palaniswamy muthusamy
 
Optical Channel Capacity of MIMO system
Optical Channel Capacity of MIMO systemOptical Channel Capacity of MIMO system
Optical Channel Capacity of MIMO system
AWANISHKUMAR84
 

What's hot (20)

Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksComparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
 
Lecture Notes: EEEC6440315 Communication Systems - Spectral Efficiency
Lecture Notes:  EEEC6440315 Communication Systems - Spectral EfficiencyLecture Notes:  EEEC6440315 Communication Systems - Spectral Efficiency
Lecture Notes: EEEC6440315 Communication Systems - Spectral Efficiency
 
Relay lte
Relay lteRelay lte
Relay lte
 
Tham khao ofdm tutorial
Tham khao ofdm tutorialTham khao ofdm tutorial
Tham khao ofdm tutorial
 
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksMultiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
 
Wc nots final unit new 7
Wc nots final unit new  7Wc nots final unit new  7
Wc nots final unit new 7
 
Cellular Networks
Cellular NetworksCellular Networks
Cellular Networks
 
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...
 
15082005174118 wca article-vfinal
15082005174118 wca article-vfinal15082005174118 wca article-vfinal
15082005174118 wca article-vfinal
 
Popular Interview Wireless Question with Answer
Popular Interview Wireless Question with AnswerPopular Interview Wireless Question with Answer
Popular Interview Wireless Question with Answer
 
OFDMA principles
OFDMA principlesOFDMA principles
OFDMA principles
 
MIMO Channel Capacity
MIMO Channel CapacityMIMO Channel Capacity
MIMO Channel Capacity
 
OFDMA
OFDMAOFDMA
OFDMA
 
Introduction to communication system lecture2
Introduction to communication system lecture2Introduction to communication system lecture2
Introduction to communication system lecture2
 
FDM,OFDM,OFDMA,MIMO
FDM,OFDM,OFDMA,MIMOFDM,OFDM,OFDMA,MIMO
FDM,OFDM,OFDMA,MIMO
 
Bit Error rate of QAM
Bit Error rate of QAMBit Error rate of QAM
Bit Error rate of QAM
 
WC & LTE 4G Broadband Module 2- 2019 by Prof.Suresha V
WC & LTE 4G Broadband  Module 2- 2019 by Prof.Suresha VWC & LTE 4G Broadband  Module 2- 2019 by Prof.Suresha V
WC & LTE 4G Broadband Module 2- 2019 by Prof.Suresha V
 
SCFDMA
SCFDMASCFDMA
SCFDMA
 
Lte antennas for 17EC81
Lte antennas for 17EC81Lte antennas for 17EC81
Lte antennas for 17EC81
 
Optical Channel Capacity of MIMO system
Optical Channel Capacity of MIMO systemOptical Channel Capacity of MIMO system
Optical Channel Capacity of MIMO system
 

Similar to Outage performance analysis of non-orthogonal multiple access systems with RF energy harvesting

Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...
TELKOMNIKA JOURNAL
 
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
journalBEEI
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
TELKOMNIKA JOURNAL
 
Hybrid protocol for wireless EH network over weibull fading channel: performa...
Hybrid protocol for wireless EH network over weibull fading channel: performa...Hybrid protocol for wireless EH network over weibull fading channel: performa...
Hybrid protocol for wireless EH network over weibull fading channel: performa...
IJECEIAES
 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...
journalBEEI
 
Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...
journalBEEI
 
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
TELKOMNIKA JOURNAL
 
Tractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMA
TELKOMNIKA JOURNAL
 
Intercept probability analysis in DF time switching full-duplex relaying netw...
Intercept probability analysis in DF time switching full-duplex relaying netw...Intercept probability analysis in DF time switching full-duplex relaying netw...
Intercept probability analysis in DF time switching full-duplex relaying netw...
TELKOMNIKA JOURNAL
 
A new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systemsA new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systems
journalBEEI
 
Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...
journalBEEI
 
Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...
journalBEEI
 
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
journalBEEI
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
nooriasukmaningtyas
 
5. 23769.pdf
5. 23769.pdf5. 23769.pdf
5. 23769.pdf
TELKOMNIKA JOURNAL
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA network
TELKOMNIKA JOURNAL
 
Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysis
nooriasukmaningtyas
 
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
TELKOMNIKA JOURNAL
 
A Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
A Threshold Enhancement Technique for Chaotic On-Off Keying SchemeA Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
A Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
CSCJournals
 
Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...
TELKOMNIKA JOURNAL
 

Similar to Outage performance analysis of non-orthogonal multiple access systems with RF energy harvesting (20)

Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...
 
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
 
Hybrid protocol for wireless EH network over weibull fading channel: performa...
Hybrid protocol for wireless EH network over weibull fading channel: performa...Hybrid protocol for wireless EH network over weibull fading channel: performa...
Hybrid protocol for wireless EH network over weibull fading channel: performa...
 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...
 
Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...
 
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
 
Tractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMA
 
Intercept probability analysis in DF time switching full-duplex relaying netw...
Intercept probability analysis in DF time switching full-duplex relaying netw...Intercept probability analysis in DF time switching full-duplex relaying netw...
Intercept probability analysis in DF time switching full-duplex relaying netw...
 
A new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systemsA new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systems
 
Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...
 
Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...
 
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
 
5. 23769.pdf
5. 23769.pdf5. 23769.pdf
5. 23769.pdf
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA network
 
Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysis
 
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
 
A Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
A Threshold Enhancement Technique for Chaotic On-Off Keying SchemeA Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
A Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
 
Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...
 

More from IJECEIAES

Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
IJECEIAES
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
IJECEIAES
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
IJECEIAES
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
IJECEIAES
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
IJECEIAES
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
IJECEIAES
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
IJECEIAES
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
IJECEIAES
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
IJECEIAES
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
IJECEIAES
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
IJECEIAES
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
IJECEIAES
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
IJECEIAES
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
IJECEIAES
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
IJECEIAES
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
IJECEIAES
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
IJECEIAES
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
IJECEIAES
 

More from IJECEIAES (20)

Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
 

Recently uploaded

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 

Recently uploaded (20)

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 

Outage performance analysis of non-orthogonal multiple access systems with RF energy harvesting

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 11, No. 5, October 2021, pp. 4135~4142 ISSN: 2088-8708, DOI: 10.11591/ijece.v11i5.pp4135-4142  4135 Journal homepage: http://ijece.iaescore.com Outage performance analysis of non-orthogonal multiple access systems with RF energy harvesting Hoang Thien Van1 , Vo Tien Anh2 , Danh Hong Le3 , Ma Quoc Phu4 , Hoang-Sy Nguyen5 1,2 The Saigon International University (SIU), Ho Chi Minh City, Vietnam 3 Van Hien University, Ho Chi Minh City, Vietnam 4 Binh Duong University, Thu Dau Mot City, Binh Duong Province, Vietnam 5 Eastem International University, Binh Duong Province, Vietnam Article Info ABSTRACT Article history: Received Aug 16, 2020 Revised Mar 4, 2021 Accepted Mar 15, 2021 Non-orthogonal multiple access (NOMA) has drawn enormous attention from the research community as a promising technology for future wireless communications with increasing demands of capacity and throughput. Especially, in the light of fifth-generation (5G) communication where multiple internet-of-things (IoT) devices are connected, the application of NOMA to indoor wireless networks has become more interesting to study. In view of this, we investigate the NOMA technique in energy harvesting (EH) half-duplex (HD) decode-and-forward (DF) power-splitting relaying (PSR) networks over indoor scenarios which are characterized by log-normal fading channels. The system performance of such networks is evaluated in terms of outage probability (OP) and total throughput for delay-limited transmission mode whose expressions are derived herein. In general, we can see in details how different system parameters affect such networks thanks to the results from Monte Carlo simulations. For illustrating the accuracy of our analytical results, we plot them along with the theoretical ones for comparison. Keywords: Delay-limited transmission Energy harvesting Log-normal fading NOMA Outage probability PSR-based protocol This is an open access article under the CC BY-SA license. Corresponding Author: Danh Hong Le Van Hien University Ho Chi Minh City, Vietnam Email: danhlh@vhu.edu.vn 1. INTRODUCTION NOMA technology is well-known because of its ability to serve multiple users exploiting the same resource block [1], [2]. Additionally, we can find in the existing literature the principal elements of NOMA, which have been well investigated, such as superposition coding, successive interference cancellation (SIC). Thus, it is needless to mention the convenience of deploying NOMA for the massive connectivity need of 5G and IoT applications, [3]-[8]. Besides, simultaneous wireless information and power transfer (SWIPT) systems, as the name suggests, exploit the radio frequency (RF) for EH and transferring data to power finite- capacity batteries in wireless relaying networks, [9]-[14]. Indeed, we can find a wide range of studies relating to EH relaying networks for outdoor scenarios in [15]-[24]. Specifically, in [15]-[17], the two relaying protocols namely power splitting-based (PS) and time switching-based (TS) and their hybrid version in cooperative relaying networks were studied. Additionally, two relay operation modes so-called amplify-and- forward (AF) and decode-forward (DF) were investigated in [18]. Especially in [22]-[24], the authors analyzed the system performance of SWIPT networks in the context of NOMA. On the contrary, despite being excellent in modelling the indoor fading variations caused by building walls and moving objects [25]-[27], log-normal fading channels are not studied that intensively comparing to common fading channels
  • 2.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142 4136 such as Rayleigh, Nakagami-m. Among the rare study pieces concerning indoor log-normal fading, there were [28-31]. Motivated by the above works, in this paper, we investigate the outage performance of NOMA EH-HD-DF-PSR networks. Differing itself from the existing works, we analyze the networks in indoor scenarios which we model with log-normal fading channels. In section 2, we describe the system model. Section 3 presents the and throughput analytical expressions of the in-studied networks. In section 4, we discuss the simulation results from the derived expressions. Finally, section 5 concludes our paper. 2. SYSTEM MODEL Depicted in Figure 1(a) is the in-studied system model whereas a source (𝑆) attempts to transmit data to two user devices denoted as 𝑈1 and 𝑈2. However, we can see that the 𝑆 → 𝑈2 communication link cannot be realized because of the in-between obstacle. Thereby, 𝑈1 is employed to relay the data transmitted from 𝑆 to 𝑈2. It should be noted that 𝑈1 operates in DF mode and is energized by EH the signal that 𝑆 sends. The 𝑆 → 𝑈1 and 𝑈1 → 𝑈2 distances are denoted with 𝑑1 and 𝑑2, and assigned with complex channel coefficients of ℎ1 and ℎ2, respectively. Besides, there are two random variables (RVs) denoted as |ℎ1|2 and |ℎ2|2 . The two RVs are independently and identically distributed (i.i.d) over the time block in the log-normal distribution manner, with parameters 𝐿𝑁(𝜇ℎ1 , 𝜎ℎ1 2 ) and 𝐿𝑁(𝜇ℎ2 , 𝜎ℎ2 2 ), respectively. Additionally, we have 𝜇ℎ1 is the mean value of 10 log(|ℎ1|2), and 𝜎ℎ𝑖 2 is the standard deviation of 10 log(|ℎ𝑖|2), 𝑖 ∈ {1,2}. With regard to Figure 1(b), we can see the PSR protocol that 𝑈1 employs in this study for EH and information transmission (IT) over the time block 𝑇. Specifically, we have 𝑇 divided into two 𝑇/2 blocks with details below. (a) (b) Figure 1. This figure are; (a) System model, (b) PSR protocol 2.1. In first time slot During the first time slot 𝑇/2, 𝑆 transmits data with a transmission power of 𝐸𝑠 to 𝑈1. The second time slot, remaining 𝑇/2, is used for IT from 𝑈1 to 𝑈2. As aforementioned, PSR protocol 𝑈1 separates the 𝐸𝑠 to two portions for EH and IT purposes. We denote the power splitting (PS) ratio as 𝛼, 0 < 𝛼 < 1. Thereby, at 𝑈1, the energy amount from EH process is: 2 1 1 ( / 2), m H S E h d E T  − = (1)
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708  Outage performance analysis of non-orthogonal multiple access systems … (Hoang Thien Van) 4137 where 0 < 𝜂 < 1 is the EH efficiency at the energy receiver, determined by the rectifier and EH circuitry that 𝑈1 deploys. Employing the superposition property of S's transmit signal in NOMA scheme [1, 2], the received signal at 𝑈1 is expressed as shown in (2). ( ) 1 1 1 1 1 1 2 1 2 , m m U S S U y h a E d x a E d x n − − = + + (2) where we have 𝑎1 and 𝑎2 are, respectively, the power allocation coefficients of target signal 𝑥1and 𝑥2 that 𝑆 attempts to send to 𝑈1 and 𝑈2. Besides, we have the additive white Gaussian noise (AWGN) at 𝑈1, which is 𝑛𝑈1 , with variance 𝑁0. We assume that 𝐸[𝑥1 2] = 𝐸[𝑥2 2] = 1. Since 𝑈2 is further from S than 𝑈1, it is allocated with more power. Thus, we have 𝑎2 > 𝑎1 > 0, which satisfies 𝑎1 + 𝑎2 = 1. Additionally, the 𝑈1 consumes a portion of the energy harvested for its operation while the rest is utilized for DF the received signal to 𝑈2. Thereby, we can express the transmission power at 𝑈1with regard to the harvested energy 𝐸𝐻 as shown in (3). 1 2 2 1 1 1 1 ( / 2) . ( / 2) ( / 2) m S m H U S h d E T E E h d E T T   − − = = = (3) Considering (2), we have the received signal-to-interference-plus-noise ratio (SINR) at 𝑈1 for detecting the signal 𝑥2 of 𝑈2 formulated in (4). 1 2 2 1 1 2 , 2 1 1 1 (1 ) , (1 ) 1 m U x m h d a h d a      − − − = − + (4) where 𝛿 = 𝐸𝑆/𝜎2 is the transmit signal-to-noise ratio (SNR). The 𝑈1 receives then decodes the signal 𝑥1 and 𝑥2 from S with the help of SIC [23]. The received SNR that 𝑈1 exploits to identify its signal, 𝑥1 is formulated as (5). 1 1 2 , 1 1 1 (1 ) . m U x h d a    − = − (5) 2.2. In second time slot After decoding signal 𝑥2, 𝑈1 forwards the signal to 𝑈2. Hence, 𝑈2 receives the signal of: ( ) 2 1 2 2 2 2 , m U U U y E d x h n − = + (6) where 𝑛𝑈2 is denoted the additive white Gaussian noise (AWGN) at 𝑈2, with variance 𝑁0. We substitute (3) into (6) to obtain: 2 2 1 2 1 2 2 . m m U U y d d h h x n   − − = + (7) Accordingly, the received SNR at 𝑈2 is expressed as 2 2 2 2 , 1 2 1 2 . m m U x h h d d   − − = (8) 3. PERFORMANCE ANALYSIS 3.1. Outage performance at 𝑈1 In NOMA setup, 𝑈1 is not subject to any outage event 𝑋 on condition that both the 𝑥1 and 𝑥2 that it receives from 𝑆 are successfully decoded. Hence, with regard to (4) and (5), we can formulate the of 𝑈1 as shown in (9). ( ) 1 1 2 2 1 1 1 , , , 1 Pr , , U X U x th U x th     = −   (9)
  • 4.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142 4138 where 𝛾𝑡ℎ1 = 22𝑅𝑈1 − 1 and 𝛾𝑡ℎ2 = 22𝑅𝑈2 − 1. To detect the 𝑥1 and 𝑥2, the target rates 𝑅𝑈1 and 𝑅𝑈2 are deployed, respectively. The probability function is 𝑃𝑟(. ). In general, the of 𝑈1, deploying 𝑋 protocol, is expressed in the Theorem 1 as (10), Theorem 1. ( ) 1 1 1 1 2 , ln(max , ) 2 1 1 erf , 2 2 2 h U X h          −     = +         (10) where 1 1 1 1 . (1 ) th m a d     − = − and ( ) 2 2 2 1 2 1 (1 ) th m th d a a      − = − − with 2 2 1 th a a   . Proof: We can compute the of 𝑈1 from (11): ( ) ( ) ( ) ( ) ( ) ( ) 1 2 , 1 1 2 2 1 1 2 1 2 1 Pr max , Pr max , max , , U X X h h F       = −  =  = (11) where 𝑋 = |ℎ1|2 . We symbolized the cumulative distribution function (CDF) of the RV 𝑋 as 𝐹𝑋(𝑚𝑎𝑥(𝜔1, 𝜔2)). Because 𝑋 is distributed following log-normal method, the CDF can be expressed as (12). ( ) ( ) ( ) ( ) 1 1 1 2 1 2 ln max , 2 1 max , 1 erf , 2 2 2 h X h F            −     = +         (12) where we have the error function erf[.] as shown in (13). ( ) 2 0 2 erf( ) exp d x x t t  = −  (13) we substitute (12) into (11) to prove the correctness of the Theorem 1. The proof ends here. 3.2. Outage performance at 2 U Additionally, 𝑈2 experiences outage event either when 𝑈1 fails to detect 𝑥2 to forward to 𝑈2 or 𝑥2 is detected but cannot be recovered by 𝑈2. Thus, with regard to (4) and (8), the of 𝑈2 is expressed as (14). ( ) ( ) 2 2 1 2 2 2 2 2 1 2 2 , , , , Pr Pr , . U x U x th U x th U x th       =  +   (14) Similarly, the of 𝑈2, deploying signal 𝑥2 protocol, as shown in (15). Theorem 2. ( ) ( ) 1 2 2 2 1 1 2 , 2 2 ln( ) 2 1 1 1 exp 1 d , 2 8 2 h U x h h x x x            −     = + + − +              (15) where 2 2 2 ln( ) 2 erfc , 2 2 h h       −   =     2 2 3 ln 2 erf , 2 2 h h x         −         =       and 2 3 1 2 . th m m d d    − − = Proof: From (14), we can rewrite the 2 2 , U x as a sum of two probabilities as shown in (16).
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708  Outage performance analysis of non-orthogonal multiple access systems … (Hoang Thien Van) 4139 ( ) 2 2 2 1 2 2 2 2 , 1 2 1 2 2 2 1 2 1 Pr Pr , . = th U x m m h h h d d h     − −      +       (16) It is possible to calculate the term 1 from ( ) 1 1 2 2 1 1 2 ln( ) 2 1 Pr 1 erf . 2 2 2 h h h          −     =  = +         (17) Additionally, 2 is calculated deploying the probability density function (PDF) and CDF of the aforementioned 𝑋 and 𝑌 = |ℎ2|2 as shown in (18): 2 2 2 1 2 1 ( ) d , th m X Y m d f x F x x d    − −    =        (18) where ( ) 1 1 1 2 2 2 ln( ) 2 ( ) exp , 8 2 2 h X h h x f x x        −   = −       (19) and 2 2 2 2 1 2 1 2 1 ln 2 1 1 1 erf . 2 2 2 th h m m th Y m m h x d d F x d d        − − − −         −               = +                       (20) Finally, (17) and (18) are substituted into (16) to obtain the of 𝑈2, which is (15). 3.3. Total system throughput It should be noted that for delay-limited transmission mode, the received signal is decoded by the destination node one block after another. Additionally, we have S transmit information with a constant rate of 𝑅𝑈𝑖 , 𝑖 ∈ (1,2), which is determined by the over log-normal fading channels. For 𝑋 protocol in the delay- limited transmission mode [21], we have the total system throughput as shown in (21). ( ) ( ) 1 1 2 2 2 , , 1 1 , X U X U U x U R R  = − + − (21) where 1, U X and 2 2 , U x are consecutively taken from Theorem 1 and 2. Besides, we have the target rates being 𝑅𝑈1 and 𝑅𝑈2 , which are respectively the target rates for 𝑈1, 𝑈2 to detect 𝑥1 and 𝑥2. 4. RESULTS AND DISCUSSION This section presents the Monte Carlo simulation results of the derived expressions to show how the PS factor and the SNR affect the system performance in PSR NOMA scenario over log-normal fading channels. The simulation results are plotted in addition to the analytical results for comparison. For the simulations, we presume that 𝜂 = 1, 𝑚 = 2, 𝑑1 = 𝑑2 = 2 (m), 𝜎ℎ1 = 𝜎ℎ2 = 4 (𝑑𝐵), 𝜇ℎ1 = 𝜇ℎ2 = 3 (𝑑𝐵). Moreover, we use the power allocation coefficients of NOMA for 𝑈1 and 𝑈2 being 𝑎1 = 0.2 and 𝑎2 = 0.8, respectively. Last but not least, we set the target rates as 𝑅𝑈1 = 2 (bps/Hz) and 𝑅𝑈2 = 1 (bps/Hz). Figure 2 shows the versus the PS factor, 𝛼. In general, we can see that the probability that the outage event happens to 𝑈1 is significantly higher than that of 𝑈2.
  • 6.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142 4140 The raises constantly to the increase of the PS factor for 𝑈1. However, for 𝑈2, the first decreases to its minimum value as PS factor approaches (0.45), then rises to its maximum when the PS factor grows further. Figures 3 and 4 consecutively plot the and the throughput versus the SNR. Specifically, in Figure 3, it is obvious that the higher the SNR, the lower the O P. Besides, in Figure 4, we can observe that the throughput-SNR curve of 𝑈1 is remarkably better than that of 𝑈2 starting from SNR=2.5 (dB). Last but not least, we can see the impact of SNR on the with two different data transmission rates in Figure 5. In particular, for the lower 𝑅𝑈1 = 𝑅𝑈2 = 𝑅𝑈0 value, the system performs better indicated by the fact that the -SNR curve converges quicker to the zeroth floor, which indicates 100% success in data transmission. In closing, we can see that the simulation results fit well the analytical ones showing the accuracy of our derived expressions. Figure 2. The performance versus the EH PS factor Figure 3. The performance versus the SNR Figure 4. The throughput of two users versus the SNR Figure 5. The versus the SNR with two different data transmission rates 5. CONCLUSION In a nutshell, we investigate the and the total throughput for delay-limited transmission mode of NOMA EH-HD-DF-PSR networks over log-normal fading channels. In general, we can conclude that the SNR increase will lead to better throughput, which subsequently makes the smaller. Furthermore, the network performs better with smaller data transmission rate and is more likely to experience outage event as the PS factor becomes higher.
  • 7. Int J Elec & Comp Eng ISSN: 2088-8708  Outage performance analysis of non-orthogonal multiple access systems … (Hoang Thien Van) 4141 ACKNOWLEDGEMENTS Thanks for the Saigon International University (SIU) funds supporting this project. REFERENCES [1] T. T. H. Ly, H. Sy Nguyen, T. Sang Nguyen, V. V. Huynh, T. Long Nguyen, and M. Voznak, "Outage Probability Analysis in Relaying Cooperative Systems with NOMA Considering Power Splitting," Symmetry, vol. 11, no.1, pp. 1-13, 2019, doi: 10.3390/sym11010072. [2] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan and V. K. Bhargava, "A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends," in IEEE Journal on Selected Areas in Communications, vol. 35, no. 10, pp. 2181-2195, Oct. 2017, doi: 10.1109/JSAC.2017.2725519. [3] S. M. R. Islam, N. Avazov, O. A. Dobre and K. Kwak, "Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges," in IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 721-742, Secondquarter 2017, doi: 10.1109/COMST.2016.2621116. [4] Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan and L. Hanzo, "Non-orthogonal Multiple Access for 5G and Beyond," Proceedings of the IEEE, vol. 105, no. 12, pp. 2347-2381, 2017, doi: 10.1109/JPROC.2017.2768666. [5] Y. Sun, D. W. K. Ng, Z. Ding and R. Schober, "Optimal Joint Power and Subcarrier Allocation for Full-Duplex Multicarrier Non-Orthogonal Multiple Access Systems," in IEEE Transactions on Communications, vol. 65, no. 3, pp. 1077-1091, Mar. 2017, doi: 10.1109/TCOMM.2017.2650992. [6] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao and L. Hanzo, "Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks," in IEEE Transactions on Wireless Communications, vol. 16, no. 3, pp. 1656-1672, Mar. 2017, doi: 10.1109/TWC.2017.2650987. [7] Z. Yang, Z. Ding, P. Fan and N. Al-Dhahir, "A General Power Allocation Scheme to Guarantee Quality of Service in Downlink and Uplink NOMA Systems," in IEEE Transactions on Wireless Communications, vol. 15, no. 11, pp. 7244-7257, Nov. 2016, doi: 10.1109/TWC.2016.2599521. [8] X. Lu, P. Wang, D. Niyato and Z. Han, "Resource allocation in wireless networks with RF energy harvesting and transfer," in IEEE Network, vol. 29, no. 6, pp. 68-75, Nov.-Dec. 2015, doi: 10.1109/MNET.2015.7340427. [9] A. Ghasempour, “Internet of Things in Smart Grid: Architecture, Applications, Services, Key Technologies, and Challenges,” Inventions journal, vol. 4, no. 1, pp. 1-12, 2019, doi: 10.3390/inventions4010022. [10] E. Boshkovska, D. W. K. Ng, N. Zlatanov and R. Schober, "Practical Non-Linear Energy Harvesting Model and Resource Allocation for SWIPT Systems," in IEEE Communications Letters, vol. 19, no. 12, pp. 2082-2085, Dec. 2015, doi: 10.1109/LCOMM.2015.2478460. [11] Y. Zeng and R. Zhang, "Full-Duplex Wireless-Powered Relay With Self-Energy Recycling," in IEEE Wireless Communications Letters, vol. 4, no. 2, pp. 201-204, Apr. 2015, doi: 10.1109/LWC.2015.2396516. [12] T. D. Ponnimbaduge Perera, D. N. K. Jayakody, S. K. Sharma, S. Chatzinotas and J. Li, "Simultaneous Wireless Information and Power Transfer (SWIPT): Recent Advances and Future Challenges," in IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 264-302, Firstquarter 2018, doi: 10.1109/COMST.2017.2783901. [13] A. Ibrahim., M. Iskandar, M. Salem, L. Awalin, A. Jusoh, and T. Sutikno, "Application of inductive coupling for wireless power transfer," International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 11, no. 3, pp. 1109-1116, 2020, doi: 10.11591/ijpeds.v11.i3.pp1109-1116. [14] M. S. Tamrin and M. R. Ahmad, "Simulation of adaptive power management circuit for hybrid energy harvester and real-time sensing application," International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 11, no. 2, pp. 656-666, 2020, doi: 10.11591/ijpeds.v11.i2.pp658-666. [15] H.-S. Nguyen, D.-T. Do, and M. Voznak, "Two-way relaying networks in green communications for 5G: Optimal throughput and trade off between relay distance on power splitting-based and time switching-based relaying SWIPT," AEU-International Journal of Electronics and Communications, vol. 70, no. 12, pp. 1637-1644, 2016, doi: 10.1016/j.aeue.2016.10.002. [16] H.-S. Nguyen., D.-T. Do, T.-S. Nguyen, and M. Voznak, "Exploiting hybrid time switching-based and power splitting-based relaying protocol inwireless powered communication networks with outdated channel state information," Automatika, vol. 58, no. 1, pp. 111-118, 2017, doi: 10.1080/00051144.2017.1372124. [17] Y. Ye, Y. Li, F. Zhou, N. Al-Dhahir and H. Zhang, "Power Splitting-Based SWIPT With Dual-Hop DF Relaying in the Presence of a Direct Link," in IEEE Systems Journal, vol. 13, no. 2, pp. 1316-1319, Jun. 2019, doi: 10.1109/JSYST.2018.2850944. [18] H. Nguyen, A. Bui, D. Do and M. Voznak, "Imperfect channel state information of AF and DF energy harvesting cooperative networks," in China Communications, vol. 13, no. 10, pp. 11-19, Oct. 2016, doi: 10.1109/CC.2016.7732008. [19] Y. Feng, V. C. M. Leung and F. Ji, "Performance Study for SWIPT Cooperative Communication Systems in Shadowed Nakagami Fading Channels," in IEEE Transactions on Wireless Communications, vol. 17, no. 2, pp. 1199-1211, Feb. 2018, doi: 10.1109/TWC.2017.2776933. [20] H.-S. Nguyen, T.-S. Nguyen, V.-T. Vo, and M. Voznak, ”Hybrid full-duplex/half-duplex relay selection scheme with optimal power under individual power constraints and energy harvesting,” Computer Communications, vol. 124, pp. 31-44, 2018, doi: 10.1016/j.comcom.2018.04.014. [21] Y. Ye, Y. Li, L. Shi, R. Q. Hu and H. Zhang, "Improved Hybrid Relaying Protocol for DF Relaying in the Presence of a Direct Link," in IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 173-176, Feb. 2019, doi: 10.1109/LWC.2018.2865476.
  • 8.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4135 - 4142 4142 [22] N. T. Do, D. B. Da Costa, T. Q. Duong and B. An, "A BNBF User Selection Scheme for NOMA-Based Cooperative Relaying Systems With SWIPT," in IEEE Communications Letters, vol. 21, no. 3, pp. 664-667, Mar. 2017, doi: 10.1109/LCOMM.2016.2631606. [23] H.-S. Nguyen.,T. T. Hoc Ly, T.-S. Nguyen, T.-L. Nguyen, and M. Voznak, "Outage performance analysis and SWIPT optimization in energy-harvesting wireless sensor network deploying NOMA," Sensors, vol. 19, no. 3, pp. 1-21, 2019, doi: 10.3390/s19030613. [24] O. Abbasi, A. Ebrahimi and N. Mokari, "NOMA Inspired Cooperative Relaying System Using an AF Relay," in IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 261-264, Feb. 2019, doi: 10.1109/LWC.2018.2869592. [25] H. Hashemi, "The indoor radio propagation channel," in Proceedings of the IEEE, vol. 81, no. 7, pp. 943-968, Jul. 1993, doi: 10.1109/5.231342. [26] A. Laourine, A. Stephenne and S. Affes, "On the capacity of log-normal fading channels," in IEEE Transactions on Communications, vol. 57, no. 6, pp. 1603-1607, Jun. 2009, doi: 10.1109/TCOMM.2009.06.070109. [27] H. Nouri, F. Touati and M. Uysal, "Diversity-Multiplexing Tradeoff for Log-Normal Fading Channels," in IEEE Transactions on Communications, vol. 64, no. 7, pp. 3119-3129, Jul. 2016, doi: 10.1109/TCOMM.2016.2575019. [28] K. M. Rabie, A. Salem, E. Alsusa and M. Alouini, "Energy-harvesting in cooperative AF relaying networks over log-normal fading channels," 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 2016, pp. 1-7, doi: 10.1109/ICC.2016.7511559. [29] K. M. Rabie, B. Adebisi and M. Alouini, "Half-Duplex and Full-Duplex AF and DF Relaying With Energy- Harvesting in Log-Normal Fading," in IEEE Transactions on Green Communications and Networking, vol. 1, no. 4, pp. 468-480, Dec. 2017, doi: 10.1109/TGCN.2017.2740258. [30] R. Katla and A. V. Babu, "Dual-hop full duplex relay networks over composite fading channels: Power and locationoptimization," Physical Communication, vol. 30, pp. 1-14, 2018, doi: 10.1016/j.phycom.2018.07.009. [31] Y. Liu, R. Xiao, J. Shen, and H. Yang, "Hybrid protocol for wireless energy harvesting network over log-normal fading channel," The Journal of Engineering, vol. 2018, no. 6, pp. 339-341, 2018, doi: 10.1049/joe.2017.0892.