Incremental relaying (IR) was developed to overcome the problems facing regular cooperative relaying methods. Out of the regular methods there is fixed relaying, in which, the relay transmits the source’s signal to the destination without considering the state of the channel. On the contrary, adaptive relaying techniques, including IR, are becoming popular among researchers nowadays; since they efficiently utilize the channel. In this paper, we studied the performance of a two-hop IR system that has decode and forward (DF) relays. Moreover, this system was analyzed over Nakagami-m fading channels, with the presence of various interferers positioned near the destination. As a result, the system suffered from co-channel interference. Remarkably, in this work, formulas were driven for the outage probability (OP) and the bit error rate (BER), and the assumptions were checked numerically.
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...ijaceeejournal
The main task of this article is to focus on the performance of cooperative MIMO relaying in terms of data rate and Power. Furthermore, compare these performances when using Maximum Ratio Combining (MRC) and equal gain combining (EGC).The average SNR improvement of MRC is typically about 5 dB better than with EGC and direct link.The preciseness of the derived closed form expression of optimum power allocation of the DF-based relaying system is demonstrated by simulation results.
Cyclic Sensing MAC Protocol for Multicast Routing in Mobilessrgjournals
Abstract:
In Ad Hoc networks realizing high throughput is achievable when directional antennas are utilized. The
directional antennas lead to higher spatial multiplexing gain. On The Other Hand, there are a few issues in
practice that comprise exposed terminal issues, deafness and hidden terminal causing the deterioration of the
performance of the community. There are several MAC protocols which were proposed, the solution offered
by Abdullah et al. is capable of solving the problems of open terminal, deafness and hidden terminal where a
new MAC method is implemented using double sensing scheme. The Spintool is used for approval of the
method integration. In this paper, we've nearly implemented the Macintosh protocol with directional
antennas. The simulation results show the proposed MAC protocol is really capable of solving the issues of
deafness, concealed terminal and exposed terminal issues. The outcomes are compared with a number of
existing protocols.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...ijaceeejournal
The main task of this article is to focus on the performance of cooperative MIMO relaying in terms of data rate and Power. Furthermore, compare these performances when using Maximum Ratio Combining (MRC) and equal gain combining (EGC).The average SNR improvement of MRC is typically about 5 dB better than with EGC and direct link.The preciseness of the derived closed form expression of optimum power allocation of the DF-based relaying system is demonstrated by simulation results.
Cyclic Sensing MAC Protocol for Multicast Routing in Mobilessrgjournals
Abstract:
In Ad Hoc networks realizing high throughput is achievable when directional antennas are utilized. The
directional antennas lead to higher spatial multiplexing gain. On The Other Hand, there are a few issues in
practice that comprise exposed terminal issues, deafness and hidden terminal causing the deterioration of the
performance of the community. There are several MAC protocols which were proposed, the solution offered
by Abdullah et al. is capable of solving the problems of open terminal, deafness and hidden terminal where a
new MAC method is implemented using double sensing scheme. The Spintool is used for approval of the
method integration. In this paper, we've nearly implemented the Macintosh protocol with directional
antennas. The simulation results show the proposed MAC protocol is really capable of solving the issues of
deafness, concealed terminal and exposed terminal issues. The outcomes are compared with a number of
existing protocols.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
The proportional fair (PF) scheduling algorithm com
promises between cell throughput and fairness. Many
research findings have been published by various re
searchers about PF algorithm based on mathematical
model and simulations. In this paper we have taken
the practical route to analyse the algorithm based
on
three types of subscription. In this benchmarking s
tudy, the user subscriptions are differentiated as
Gold,
Silver and Bronze schemes and they are provisioned
with certain throughputs. Apart from subscriptions
plans, the channel condition also plays a major rol
e in determining the throughput. So in order to ens
ure
fairness among different subscriptions even in the
bad channel conditions and to deliver the provision
ed
throughputs certain priorities are attached with th
e subscriptions. As per the subscription plans Gold
subscribers are assigned with 50% of the speed offe
red by the network as maximum based on CAT3 speed
(100 Mbps in DL and 50 Mbps in UL), Silver is assig
ned with 25% of the max speed and Bronze is
assigned with 12% of the max speed. The priorities
assigned to subscribers determines the fairness in
the
unfavourable channel conditions - Bronze (high), Si
lver and Gold (medium). In this paper, an
benchmarking tests have been performed with all of
three types of subscribers for nearly two hours in
the
live single cell network without any heterogeneous
cells influencing it. Furthermore, the results are
compared with the simulation results.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
In this paper, we investigate the system performance in term of outage probability (OP) and intercept probability (IP) user selection protocols in full-duplex (FD) power splitting protocol (PSP) energy harvesting (EH) cooperative network over the Rayleigh fading channel. In this network, security and privacy issues are significant due to the possible eavesdropping by surrounding users. In this case, the security performance and reliable performance are represented by outage probability (OP) and intercept probability (IP), respectively. The power-splitting energy harvesting protocol is applied in our analysis. We rigorously derive the closed-form expressions of both OP and IP of the system and study the effect of various parameters. Finally, the Monte Carlo simulation results are also performed to confirm the correctness of all theoretical analysis derived.
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN
channel and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
A Review on Partner Selection Techniques in Cooperative CommunicationAM Publications
Future generations of cellular communications requires higher data rates and a more reliable transmission
link with the growth of multimedia services, while keeping satisfactory quality of service. At the same time, the mobile
terminals must be simple, cheap, and smaller in size. MIMO antenna systems have been considered as an efficient
approach to direct these demands by offering significant multiplexing and diversity gains over single antenna systems
without increasing bandwidth and power. However, implementing multiple antennas at wireless terminal is not
realistic due to size, power, cost, and weight constraints. So, Virtual MIMO known as Cooperative Diversity was
introduced. In cooperative wireless networks, it is often the case that multiple sources and multiple partners
cooperate to transmit their data to destination. For the cooperative systems, selecting an appropriate partner node is
of prime importance. Cooperative communications can efficiently combat the severity of fading and shadowing
through the assistance of partners. This paper presents the different partner selection techniques to select an
appropriate partner to reduce transmission power and to improve overall performance of the wireless network.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...ijwmn
In this paper, we proposed a novel efficient method of analyzing the ergodic channel capacity of the
cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a very tight
approximate moment generating function (MGF) of end-to-end signal-to-noise ratio of 2-hop multi-relay
system, which is In this paper, we proposed a novel efficient method of analyzing the ergodic channel
capacity of the cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a
very tight approximate moment applicable to myriad of fading environments including mixed and
composite fading channels. Three distinct adaptive source transmission policies were considered in our
analysis namely: (i) constant power with optimal rate adaptation (ORA); (ii) optimal joint power and rate
adaptation (OPRA); and (iii) fixed rate with truncated channel inversion (TCIFR). The proposed frame
work based on the novel approximate MGF method is sufficiently general to encapsulate all types of fading
environments (especially for the analysis of the mixed fading case)and provides significant advantage to
model wireless system for mixed and composite fading channel. In addition to simplifying computation
complexity of ergodic capacity for CAF relaying schemes treated in literature, we also derive closed form
expressions for the above three adaptive source transmission policies under Nakagami-m fading with i.n.d
statistics. The accuracy of our proposed method has been validated with existing MGF expressions that are
readily available for specific fading environments in terms of bounds, and via Monte Carlo simulations.
A low complexity distributed differential scheme based on orthogonal space t...IJECEIAES
This work proposes a new differential cooperative diversity scheme with high data rate and low decoding complexity using the decode-and-forward protocol. The proposed model does not require either differential encoding or channel state information at the source node, relay nodes, or destination node where the data sequence is directly transmitted and the differential detection method is applied at the relay nodes and the destination node. The proposed technique enjoys a low encoding and decoding complexity at the source node, the relay nodes, and the destination node. Furthermore, the performance of the proposed strategy is analyzed by computer simulations in quasi-static Rayleigh fading channel and using the decode-and-forward protocol. The simulation results show that the proposed differential technique outperforms the corresponding reference strategies.
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
The proportional fair (PF) scheduling algorithm com
promises between cell throughput and fairness. Many
research findings have been published by various re
searchers about PF algorithm based on mathematical
model and simulations. In this paper we have taken
the practical route to analyse the algorithm based
on
three types of subscription. In this benchmarking s
tudy, the user subscriptions are differentiated as
Gold,
Silver and Bronze schemes and they are provisioned
with certain throughputs. Apart from subscriptions
plans, the channel condition also plays a major rol
e in determining the throughput. So in order to ens
ure
fairness among different subscriptions even in the
bad channel conditions and to deliver the provision
ed
throughputs certain priorities are attached with th
e subscriptions. As per the subscription plans Gold
subscribers are assigned with 50% of the speed offe
red by the network as maximum based on CAT3 speed
(100 Mbps in DL and 50 Mbps in UL), Silver is assig
ned with 25% of the max speed and Bronze is
assigned with 12% of the max speed. The priorities
assigned to subscribers determines the fairness in
the
unfavourable channel conditions - Bronze (high), Si
lver and Gold (medium). In this paper, an
benchmarking tests have been performed with all of
three types of subscribers for nearly two hours in
the
live single cell network without any heterogeneous
cells influencing it. Furthermore, the results are
compared with the simulation results.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
In this paper, we investigate the system performance in term of outage probability (OP) and intercept probability (IP) user selection protocols in full-duplex (FD) power splitting protocol (PSP) energy harvesting (EH) cooperative network over the Rayleigh fading channel. In this network, security and privacy issues are significant due to the possible eavesdropping by surrounding users. In this case, the security performance and reliable performance are represented by outage probability (OP) and intercept probability (IP), respectively. The power-splitting energy harvesting protocol is applied in our analysis. We rigorously derive the closed-form expressions of both OP and IP of the system and study the effect of various parameters. Finally, the Monte Carlo simulation results are also performed to confirm the correctness of all theoretical analysis derived.
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN
channel and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
A Review on Partner Selection Techniques in Cooperative CommunicationAM Publications
Future generations of cellular communications requires higher data rates and a more reliable transmission
link with the growth of multimedia services, while keeping satisfactory quality of service. At the same time, the mobile
terminals must be simple, cheap, and smaller in size. MIMO antenna systems have been considered as an efficient
approach to direct these demands by offering significant multiplexing and diversity gains over single antenna systems
without increasing bandwidth and power. However, implementing multiple antennas at wireless terminal is not
realistic due to size, power, cost, and weight constraints. So, Virtual MIMO known as Cooperative Diversity was
introduced. In cooperative wireless networks, it is often the case that multiple sources and multiple partners
cooperate to transmit their data to destination. For the cooperative systems, selecting an appropriate partner node is
of prime importance. Cooperative communications can efficiently combat the severity of fading and shadowing
through the assistance of partners. This paper presents the different partner selection techniques to select an
appropriate partner to reduce transmission power and to improve overall performance of the wireless network.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...ijwmn
In this paper, we proposed a novel efficient method of analyzing the ergodic channel capacity of the
cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a very tight
approximate moment generating function (MGF) of end-to-end signal-to-noise ratio of 2-hop multi-relay
system, which is In this paper, we proposed a novel efficient method of analyzing the ergodic channel
capacity of the cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a
very tight approximate moment applicable to myriad of fading environments including mixed and
composite fading channels. Three distinct adaptive source transmission policies were considered in our
analysis namely: (i) constant power with optimal rate adaptation (ORA); (ii) optimal joint power and rate
adaptation (OPRA); and (iii) fixed rate with truncated channel inversion (TCIFR). The proposed frame
work based on the novel approximate MGF method is sufficiently general to encapsulate all types of fading
environments (especially for the analysis of the mixed fading case)and provides significant advantage to
model wireless system for mixed and composite fading channel. In addition to simplifying computation
complexity of ergodic capacity for CAF relaying schemes treated in literature, we also derive closed form
expressions for the above three adaptive source transmission policies under Nakagami-m fading with i.n.d
statistics. The accuracy of our proposed method has been validated with existing MGF expressions that are
readily available for specific fading environments in terms of bounds, and via Monte Carlo simulations.
A low complexity distributed differential scheme based on orthogonal space t...IJECEIAES
This work proposes a new differential cooperative diversity scheme with high data rate and low decoding complexity using the decode-and-forward protocol. The proposed model does not require either differential encoding or channel state information at the source node, relay nodes, or destination node where the data sequence is directly transmitted and the differential detection method is applied at the relay nodes and the destination node. The proposed technique enjoys a low encoding and decoding complexity at the source node, the relay nodes, and the destination node. Furthermore, the performance of the proposed strategy is analyzed by computer simulations in quasi-static Rayleigh fading channel and using the decode-and-forward protocol. The simulation results show that the proposed differential technique outperforms the corresponding reference strategies.
On the performance of energy harvesting AF partial relay selection with TAS a...IJECEIAES
Energy scarcity has been known to be one of the most noticeable challenges in wireless communication system. In this paper, the performance of an energy harvesting based partial relay selection (PRS) cooperative system with transmit antenna selection (TAS) and outdated channel state information (CSI) is investigated. The system dual-hops links are assumed to follow Rayleigh distribution and the relay selection is based on outdated CSI of the first link. To realize the benefit of multiple antenna, the amplified-andforward (AF) relay nodes then employs the TAS technique for signal transmission and signal reception is achieved at the destination through maximum ratio combining (MRC) scheme. Thus, the closed-form expression for the system equivalent end-to-end cumulative distribution function (CDF) is derived. Based on this, the analytical closed-form expressions for the outage probability, average bit error rate, and throughput for the delaylimited transmission mode are then obtained. The results illustrated that the energy harvesting time, relay distance, channel correlation coefficient, the number of relay transmit antennas and destination received antenna have significant effect on the system performance. Monte-carol simulation is employed to validate the accuracy of the derived expressions.
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selectioninventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
THE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAYIJCNCJournal
Wireless communication faces adversities due to noise, fading, and path loss. Multiple-Input MultipleOutput (MIMO) systems are used to overcome individual fading effect by employing transmit diversity. Duo to user single-antenna, Cooperation between at least two users is able to provide spatial diversity. This paper presents the evaluation of the performances of the Amplify and Forward (AF) cooperative system for different relay positions using several network topologies over Rayleigh and Rician fading channel. Furthermore, we present the performances of AF cooperative system with various power allocation. The results show that cooperative communication with convolutional coding shows an outperformance compared to the non-convolutional, which is a promising solution for high data-rate networks such as (WSN), Ad hoc, (IoT), and even mobile networks. When topologies are compared, the simulation shows that, linear topology offers the best BER performance, in contrast when the relay acts as source and the source take the relay place, the analysis result shows that, equilateral triangle topology has the best BER performance and stability, and the system performance with inter-user Rician fading channel is better than the performance of the system with inter-user Rayleigh fading channel.
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
: In this paper, a distributed spatial modulation based cooperative diversity scheme for relay
wireless networks is proposed. Where, the space-time block code is exploited to integrate with distributed
spatial modulation. Therefore, the interested transmission scheme achieves high diversity gain. By using
Monte-Carlo simulation based on computer, we showed that our proposed transmission scheme outperforms
state-of-the-art cooperative relaying schemes in terms bit error rate (BER) performance.
Rate Adaptation for Time Varying Channels Using Distributed Relay Selectionpaperpublications3
Abstract: Fixed systems used in cooperative communication suffer from multiplexing loss and low spectral efficiency due to the half duplex constraint of relays. To improve the multiplexing gain, successive relaying is proposed. This allows concurrent transmission of the source and relays. However, the severe inter-relay interference becomes a key challenge. Here Rate Adaptation for Time Varying Channels Using Distributed Relay Selection is proposed, which is capable of adapting the relay’s rate using distributed relay selection.
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...Kumar Goud
Abstract: - Multiple Inputs and Multiple Output (MIMO) and Orthogonal Frequency Division Multiplexing (OFDM) system have the potential to attain high capability on the propagation setting. The aim of this paper is that the adaptive resource allocation in MIMO-OFDM system uses the water filling formula. Water filling answer is enforced for allocating the ability so as to extend the data rate. The overall system capability is maximised subject to the constraints on total power, signal to noise quantitative relation, and proportionality. Channel is assumed as a flat attenuation channel and therefore the comparison is created for various 2×2, 2×3, 3×2 and 4×4 MIMO-OFDM systems and water filling formula with allotted power. Supported the capability contribution from the relaying terminal, a brand new parameter referred to as cooperation constant is introduced as an operate of the relaying sub channel. This parameter is employed to switch the target parameter of the subcarrier allocation procedure. Fairness-oriented [Fading Channel] and throughput-oriented [Near finish Channel] algorithms square measure elite from the literature to check the planned technique. Each algorithms square measure changed to use the mean of cooperation constant within the objective parameter of the subcarrier allocation procedure and shown to own a much better total turnout with none sacrifice.
Keywords - MIMO-OFDM; Water filling Algorithm; Subcarrier Resource Allocation
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of MIMO communication in such type of network is enhancing the packet transmission capabilities. There are different techniques for cooperative transmission and broadcasting packet in MIMO equipped Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a new scheduling algorithm based on investigating the different broadcasting algorithm. The new broadcasting algorithm improves the packet transmission rate of the network based on energy performance of the network and minimizes the BER for different transmission mode which is illustrated in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result for the packet transmission rate are collected and shown in the tabular form. Also simulate the network for generating a comparative statement for each mobile node. And performance analysis is also done for the model network. The main focus is to minimize BER and improve information efficiency of the network.
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...ijwmn
International Journal of Wireless & Mobile Networks (IJWMN)
Similar to Performance evaluation of decode and forward cooperative diversity systems over nakagami-m fading channels with non-identical interferers (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
2. Int J Elec & Comp Eng ISSN: 2088-8708
Performance evaluation of decode and forward cooperative diversity systems …. (Mamoun F. Al-Mistarihi)
5317
transmission). Second, separate transmissions, of the information packet, will take place at the source and at
the relay towards the destination with a prespecified multiple access technique.
Multipath fading can be prevented by cooperative diversity [14], in which, the antennas of the nodes
act as a virtual antenna array. This is done in order to avoid having many antennas on each node,
for limitations like size and complexity. Cooperative digital relaying protocols have the problem of error
propagation in the relay destination link. To solve this problem, there are two scenarios.
First, the source-relay’s Channel State Information (CSI) would be known to the destination [14],
or, the second, the relay would transmit the source’s signal depending on its quality [15]. The second solution
wastes the spectrum resource in half-duplex relaying.
Fixed relaying methods represent one form of cooperative diversity in which a pre-deterministic
manner governs the relaying process of intermediate nodes [13]. These methods are easy to implement but
they don’t utilize the channel efficiently. Amplify-and-Forward (AF) and the DF relaying techniques were
explained in [16-26]. On the other hand, in [27, 28], the authors derived the BER and the OP of Rayleigh
channels with AF fixed relaying. Moreover, AF relaying performance in Rayleigh fading environment was
studied in terms of OP and symbol error probability (SEP) in [29].
As aforementioned, the utilization of channel resources is low in fixed relaying, thus, Incremental
Relaying (IR) is employed in modern wireless communication systems. IR systems use the relay only when
needed, thus enhances the channel utilization. As an application, authors of [30, 31] have studied a DF-IR
system with one relay through a Rayleigh fading channel. As for their contribution, they derived formulas for
the BER and the OP. Authors of [32, 33] have derived the formulas for the BER and the OP of a two-hop
DF-IR via Nakagami-m and mixed fading channels with existence of several L equal interferers placed close
to the destination.
In this paper, we propose a full examination of a DF-IR system that suffers from co-channel
interference due to Nakagami-m fading along with some L unique interferers placed near the destination.
A sum of distinguishable and independent Rayleigh random variables is used to represent the interferers in
the system. In specific, we properly examine the relay-based DF cooperative diversity system’s performance
with the system consideration of Nakagami-m fading channels with distinguishable interferers near
the destination. Preliminary results of this work have been presented in [34].
Besides, the following bullet points provide a summary of our contributions:
1. Coming into both the Cumulative Distributed Function (CDF) and the Probability Density Function
(PDF) of the spontaneous Signal to Interference Ratio (SIR) at the combiner’s output and consequently
using them in formulating the BER and the OP.
2. Attaining tight formulas for the system’s BER and OP with the existence of several L distinguishable
interferers close to the destination. The destination-interferer fading channels are assumed to be the sum
of unique and independent Rayleigh random variables.
This work is formed as the following; Section 2 displays our proposed system model. Section 3 has
the analysis of the system’s performance and the derivation of the BER and OP expressions. Section 4 shows
the results with discussions. In the end, section 5 concludes this work.
2. SYSTEM MODEL
Figure 1 shows a single channel that has three independent Nakagami-m coefficients;
the source-destination ℎ 𝑆,𝐷, the relay-destination ℎ 𝑅,𝐷 and the source-relay ℎ 𝑆,𝑅. A feedback sent by
the destination requesting the source’s signal from the relay is called negative feedback. This feedback is
triggered, towards the relay and the source, if the signal of the source wasn’t received clearly in the first time
slot. In the following time slot, the signals received from the relay and ones received from the source will be
combined at the destination using maximal ratio combiner (MRC) to enhance the received signal.
An additive white gaussian noise (AWGN), with a variance equal to 1, is assumed to exist at the destination.
There exists an antenna per node along with several L interferers near the destination that introduce
co-channel interference. Remarkably, the interferers links are assumed to be Rayleigh random variables
(unique and independent). Moreover, the sum of the Rayleigh random variables signifies the channel holding
the aforementioned connections. Time division multiple access is the multiple access technique adopted
in this paper.
In the first time slot, the signal is broadcasted by the source. Consequently, in the second time slot,
a decision is made by the destination to determine whether it needs a relay or not. If the relay is not needed,
(or we have a successful Direct Transmission (DT)), a positive feedback would be transmitted throughout
two paths, (the relay-destination and the source-destination), acquiring another signal from the source in
the following time slot.
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5316 - 5328
5318
Figure 1. Cooperative diversity system with several L distinguishable Interferers placed close
to the destination
Considering the events described above, the signals in the first time slot are going to be examined at
the destination and at the relay as shown on (1) and (2):
𝑦𝑆,𝐷(𝑡1) = ℎ 𝑆,𝐷√ 𝐸𝑠 𝑥(𝑡1) + 𝑛1(𝑡1) + 𝐼(𝑡1) (1)
𝑦𝑆,𝑅(𝑡1) = ℎ 𝑆,𝑅√ 𝐸𝑠 𝑥(𝑡1) + 𝑛2(𝑡1) (2)
where 𝑦𝑆,𝐷(𝑡1) and 𝑦𝑆,𝑅(𝑡1) declare the two signals received at the destination and the relay and 𝐸𝑠 is
the energy of the source signal. 𝑥(𝑡1) is the signal of the source in the first time slot. 𝑛1(𝑡1), and 𝑛2(𝑡1) are
the AWGN symbols. 𝐼(𝑡1) represents the interferers’ effects in the first time slot.
If a DT was not accomplished, a negative feedback is sent by the destination towards the source and
the relay, which represent a query for the relay’s help. The relay will decode the source’s signal, re-encode it,
and finally transmit it to the destination in the second time slot. Telling the events described above in
equation format can be done by expressing the destination’s received signal in the second time slot in (3):
𝑦 𝑅,𝐷(𝑡2) = ℎ 𝑅,𝐷√ 𝐸𝑠 𝑥 𝑟(𝑡2) + 𝑛3(𝑡2) + 𝐼(𝑡2) (3)
where 𝑥 𝑟(𝑡2) is the relay’s re-encoded signal, 𝐼(𝑡2) is the interferers’ effects within the second time slot.
Interestingly, the source-destination path’s outage depend on comparing the path’s SNR versus 𝛾𝑜, which
signifies the minimum threshold that lets the destination correctly handle the source’s signal from the DT.
3. PERFORMANCE ANALYSIS
We bypassed the effect of the noise at the destination in our analysis; because it is not comparable
with the co-channel interference. In other words, we will use SIR instead of signal-to-interference-and-noise-
ratio (SINR). In the subsequent text, the derivation of the destination SIR’s PDF and CDF from both
the relay-destination and the source-destination paths is proposed.
3.1. PDF of SIR’s 𝜼 𝑺,𝑫 and 𝜼 𝑹,𝑫
The SIR’s (𝜂 𝑆,𝐷) PDF in the source-destination’s link is calculated as the following:
𝑓𝜂 𝑆,𝐷
(𝜂 𝑆,𝐷) =
(𝑚)!
Γ(𝑚)
∑ 𝜋 𝑘 [
𝜆 𝑆,𝐷 𝜂 𝑆,𝐷
𝑚−1
(𝜂 𝑆,𝐷+𝜆 𝑆,𝐷)
𝑚+1]𝐿
𝑘=1 (4)
4. Int J Elec & Comp Eng ISSN: 2088-8708
Performance evaluation of decode and forward cooperative diversity systems …. (Mamoun F. Al-Mistarihi)
5319
where 𝜆 𝑆,𝐷 = (
𝛾 𝑆,𝐷̅̅̅̅̅̅
𝑚𝛾 𝑘,1̅̅̅̅̅̅
), 1 is used to refer to the first time slot, 𝜋 𝑘 = ∏
𝛾 𝑘̅̅̅̅
𝛾 𝑘̅̅̅̅−𝛾𝑖̅
𝐿
𝑖=1
𝑖≠𝑘
, L is the number of interferers.
The SIR’s (𝜂 𝑅,𝐷) PDF in the relay-destination’s link is calculated as the following:
𝑓𝜂 𝑅,𝐷
(𝜂 𝑅,𝐷) =
(𝑚)!
Γ(𝑚)
∑ 𝜋 𝑘 [
𝜆 𝑅,𝐷 𝜂 𝑅,𝐷
𝑚−1
(𝜂 𝑅,𝐷+𝜆 𝑅,𝐷)
𝑚+1]𝐿
𝑘=1 (5)
where 𝜆 𝑅,𝐷 = (
𝛾 𝑅,𝐷̅̅̅̅̅̅̅
𝑚𝛾 𝑘,2̅̅̅̅̅̅
), 2 is used to refer to the second time slot.
Proof:
The SNRs of the source-destination and the relay-destination paths, 𝛾𝑆,𝐷 and 𝛾 𝑅,𝐷 respectively,
are exponentially distributed. Moreover, the interferers fading channels’ SNR (𝛾 𝑏 = ∑ 𝛾 𝑘
𝐿
𝑘=1 ) is assumed to
be the sum of unique and independent exponential random variables. Thus, the SIR’s (𝜂 𝑆,𝐷) PDF is
processed as [35]:
𝑓𝜂 𝑆,𝐷
(𝜂 𝑆,𝐷) = ∫ 𝛾 𝑏 𝑓𝛾 𝑆,𝐷
(𝛾 𝑏 𝜂 𝑆,𝐷)𝑓𝛾 𝑏
(𝛾 𝑏)𝑑𝛾 𝑏
∞
0
(6)
and the SIR’s (𝜂 𝑅,𝐷) PDF is computed as:
𝑓𝜂 𝑅,𝐷
(𝜂 𝑅,𝐷) = ∫ 𝛾 𝑏 𝑓𝛾 𝑅,𝐷
(𝛾 𝑏 𝜂 𝑅,𝐷)𝑓𝛾 𝑏
(𝛾 𝑏)𝑑𝛾 𝑏
∞
0
(7)
The PDFs of 𝛾𝑆,𝐷, 𝛾 𝑅,𝐷 and 𝛾 𝑏 are denoted as:
𝑓𝛾 𝑆,𝐷
(𝛾𝑆,𝐷) =
𝑚 𝑚 𝛾 𝑆,𝐷
𝑚−1
𝛾 𝑆,𝐷̅̅̅̅̅̅ 𝑚
Γ(𝑚)
𝑒𝑥𝑝 (−
𝑚𝛾 𝑆,𝐷
𝛾 𝑆,𝐷̅̅̅̅̅̅
), 𝛾𝑆,𝐷 > 0 (8)
𝑓𝛾 𝑅,𝐷
(𝛾 𝑅,𝐷) =
𝑚 𝑚 𝛾 𝑅,𝐷
𝑚−1
𝛾 𝑅,𝐷̅̅̅̅̅̅̅ 𝑚
Γ(𝑚)
𝑒𝑥𝑝 (−
𝑚𝛾 𝑅,𝐷
𝛾 𝑅,𝐷̅̅̅̅̅̅̅
), 𝛾 𝑅,𝐷 > 0 (9)
𝑓𝛾 𝑏
(𝛾 𝑏) = ∑
𝜋 𝑘
𝛾 𝑘̅̅̅̅
𝐿
𝑘=1 𝑒
(−
𝛾 𝑏
𝛾 𝑘̅̅̅̅
)
, 𝛾 𝑏 > 0 (10)
while the average SNR of each destination-interferer’s channel is represented by 𝛾 𝑘̅̅̅.
Integral (6) can be solved by using [36, (3.351.3)] to get the PDF of the SIR for
the source-destination’s link in (4). Similarly, integral (7) is solved using the same equation to obtain
the SIR’s PDF of the relay path in (5).
3.2. CDF of SIR’s 𝜼 𝑺,𝑫 and 𝜼 𝑹,𝑫
The SIR’s (𝜂 𝑆,𝐷) CDF in the source-destination’s link is calculated as the following:
𝐹𝜂 𝑆,𝐷
(𝜂 𝑆,𝐷) =
(𝑚−1)!
Γ(𝑚)
∑ 𝜋 𝑘 (
𝜂 𝑆,𝐷
𝜆 𝑆,𝐷
)
𝑚
1 (𝑚 + 1, 𝑚; 𝑚 + 1; −
𝜂 𝑆,𝐷
𝜆 𝑆,𝐷
)2
𝐹𝐿
𝑘=1 (11)
The SIR’s (𝜂 𝑅,𝐷) CDF in the relay-destination’s link is provided as the following:
𝐹𝜂 𝑅,𝐷
(𝜂 𝑅,𝐷) =
(𝑚−1)!
Γ(𝑚)
∑ 𝜋 𝑘 (
𝜂 𝑅,𝐷
𝜆 𝑅,𝐷
)
𝑚
1 (𝑚 + 1, 𝑚; 𝑚 + 1; −
𝜂 𝑅,𝐷
𝜆 𝑅,𝐷
)2
𝐹𝐿
𝑘=1 (12)
where 1(𝑎, 𝑏; 𝑐; 𝑧)2
𝐹
is the Gaussian Hypergeometric function [36].
Proof:
The 𝜂 𝑆,𝐷 CDF is computed as [35]:
𝐹𝜂 𝑆,𝐷
(𝜂 𝑆,𝐷) = ∫ 𝑓𝜂 𝑆,𝐷
(𝑦)𝑑𝑦
𝜂 𝑆,𝐷
0
(13)
where 𝑓𝜂 𝑆,𝐷
(𝑦) is given in (4).
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5316 - 5328
5320
The CDF of 𝜂 𝑅,𝐷 is established by taking the integral of the PDF of 𝜂 𝑅,𝐷 given in (5) as
the following:
𝐹𝜂 𝑅,𝐷
(𝜂 𝑅,𝐷) = ∫ 𝑓𝜂 𝑅,𝐷
(𝑦)𝑑𝑦
𝜂 𝑅,𝐷
0
(14)
Solving the integrals in (13) and (14) using [36, (3.194.1)], the tight formula of the 𝜂 𝑆,𝐷’s CDF is
going to be as (11) and 𝜂 𝑅,𝐷’s CDF is going to be as (12).
3.3. BER analysis
The BER of the IR system is designated as:
𝑝𝑒 = Pr(𝜂 𝑆,𝐷 ≤ 𝛾𝑜) × 𝑃𝑑𝑖𝑣(𝑒) + (1 − Pr(𝜂 𝑆,𝐷 ≤ 𝛾𝑜)) × 𝑃𝑑𝑖𝑟𝑒𝑐𝑡(𝑒) (15)
Depending on whether the relay is going to help or not, (15) encloses the two unconditional BER
cases. Specifically, (15)’s second segment is used for the BER when the destination relies only on the DT.
However, the first segment of (15) is for the BER of the path between the relay and the destination, where
the destination would be using MRC to combine both signals.
𝑃𝑑𝑖𝑣(𝑒) is the average MRC error probability in the combined diversity communication of the paths:
source- and relay- destination. 𝑃𝑑𝑖𝑟𝑒𝑐𝑡(𝑒) is the destination’s error probability only in the source-destination
path. 𝑃𝑑𝑖𝑟𝑒𝑐𝑡(𝑒) can be expressed as:
𝑃𝑑𝑖𝑟𝑒𝑐𝑡(𝑒) = ∫ 𝑃𝑑𝑖𝑟𝑒𝑐𝑡(𝑒|𝜂)𝑓𝜂 𝑆,𝐷
(𝜂|𝜂 𝑆,𝐷 > 𝛾𝑜)𝑑𝜂 𝑆,𝐷
∞
0
(16)
where 𝑃𝑑𝑖𝑟𝑒𝑐𝑡(𝑒|𝜂) is the conditional error probability which equals 𝛼 𝑄(√ 𝛽𝜂 𝑆,𝐷) with the constellation
parameters 𝛼 and 𝛽. For instance, for Binary Phase Shift Keying (BPSK),𝛼 = 1 𝑎𝑛𝑑 𝛽 = 2, for M-PSK,
𝛼 = 1 𝑎𝑛𝑑 𝛽 = 2 sin (
𝜋
𝑀
)
2
and for M-QAM, 𝛼 = 4 𝑎𝑛𝑑 𝛽 =
3
(𝑀−1)
and 𝑄(𝑥) =
1
√2𝜋
∫ 𝑒
(−
𝑦2
2
)∞
𝑥
𝑑𝑦 is
the Gausian Q-function. 𝑓𝜂 𝑆,𝐷
(𝜂|𝜂 𝑆,𝐷 > 𝛾𝑜) is the conditional PDF of 𝜂 𝑆,𝐷 given that 𝜂 𝑆,𝐷 is above
the threshold 𝛾𝑜 to indicate that the DT is successful which is given as:
𝑓𝜂 𝑆,𝐷
(𝜂|𝜂 𝑆,𝐷 > 𝛾𝑜) = {
0 , 𝜂 ≤ 𝛾𝑜
𝜌 ∑ 𝜋 𝑘
𝐿
𝑘=1 𝜆 𝑆,𝐷 [
𝜂 𝑆,𝐷
𝑚−1
(𝜂 𝑆,𝐷+𝜆 𝑆,𝐷)
𝑚+1] , 𝜂 ≥ 𝛾𝑜
(17)
where
𝜌 =
(𝑚)!
[Γ(𝑚)−(𝑚−1)! ∑ 𝜋 𝑘(
𝛾 𝑜
𝜆 𝑆,𝐷
)
𝑚
1(𝑚+1,𝑚;𝑚+1;−
𝛾 𝑜
𝜆 𝑆,𝐷
)2
𝐹𝐿
𝑘=1 ]
The approximated expression of 𝑃𝑑𝑖𝑟𝑒𝑐𝑡(𝑒) can be found by placing (17) into (16) and using the
Prony estimation of the Q-function with [36, (3.353.1)], and it is given as:
𝑃𝑑𝑖𝑟𝑒𝑐𝑡(𝑒) = 𝛼𝜌 ∑ 𝐴𝑖 ∑ 𝜋 𝑘
𝐿
𝑘=1 𝜆 𝑆,𝐷 ∑
(−𝑎 𝑖 𝛽) 𝑛
𝑛!
∞
𝑛=0
2
𝑖=1
× [
𝑒−(𝑛+𝑚)𝛾 𝑜
𝑚!
∑
(𝑗−1)! (−𝑛−𝑚) 𝑚−𝑗
(𝛾 𝑜+𝜆 𝑆,𝐷) 𝑗
𝑚
𝑗=1 −
(−𝑛−𝑚) 𝑚
𝑚!
𝑒(𝑛+𝑚)𝜆 𝑆,𝐷 𝐸𝑖[−(𝑛 + 𝑚)(𝛾𝑜 + 𝜆 𝑆,𝐷)]] (18)
where 𝐸𝑖[𝑥] is the exponential integral function [36, (8.211.1)] and the terms 𝐴𝑖 and 𝑎𝑖 are the Prony
estimation parameters. Full derivation of 𝑃𝑑𝑖𝑟𝑒𝑐𝑡(𝑒) is provided in appendix A. The expression of the error
probability 𝑃𝑑𝑖𝑣(𝑒), when the relay is helping and the destination is using MRC, is given by:
𝑃𝑑𝑖𝑣(𝑒) = 𝑝 𝑆𝑅(𝑒)𝑝 𝑥(𝑒) + (1 − 𝑝 𝑆𝑅(𝑒))𝑝𝑐𝑜𝑚(𝑒) (19)
where 𝑝 𝑆𝑅(𝑒) represents the relay’s error probability in the source-relay path and 𝑝 𝑥(𝑒) is the destination’s
error probability when the relay decodes the signal ineffectively and it is restricted to be below 0.5 as
stated in [21]. 𝑝𝑐𝑜𝑚(𝑒) is the destination’s error probability when the relay correctly decodes the signal.
6. Int J Elec & Comp Eng ISSN: 2088-8708
Performance evaluation of decode and forward cooperative diversity systems …. (Mamoun F. Al-Mistarihi)
5321
The expression (1 − 𝑝 𝑆𝑅(𝑒)) indicates successful decoding at the relay, which achieves spatial
diversity at the destination when it uses MRC to combine both received signals. 𝑝 𝑆𝑅(𝑒) is expressed as [1]:
𝑝 𝑆𝑅(𝑒) =
{
1
2
[1 − 𝜇 (
𝛼2 𝛾𝑆,𝑅̅̅̅̅̅
2𝑚
) ∑ (2𝑘
𝑘
) (
1−𝜇2(
𝛼2 𝛾 𝑆,𝑅̅̅̅̅̅̅̅
2𝑚
)
4
)
𝑘
𝑚−1
𝑘=0 ] 𝑚 𝑖𝑠 𝑖𝑛𝑡𝑒𝑔𝑒𝑟
1
2√𝜋
√
𝛼2 𝛾 𝑆,𝑅̅̅̅̅̅̅̅
2𝑚
(1+
𝛼2 𝛾 𝑆,𝑅̅̅̅̅̅̅̅
2𝑚
)
𝑚+(1/2)
Γ(𝑚+
1
2
)
Γ(𝑚+1)
× 𝐹12 (1, 𝑚 +
1
2
; 𝑚 + 1; (
𝑚
𝑚+
𝛼2 𝛾 𝑆,𝑅̅̅̅̅̅̅̅
2
)) 𝑚 𝑖𝑠 𝑛𝑜𝑛𝑖𝑛𝑡𝑒𝑔𝑒𝑟
(20)
where 𝜇 (
𝛼2 𝛾 𝑆,𝑅̅̅̅̅̅̅
2𝑚
) ≜ √
𝛼2 𝛾 𝑆,𝑅̅̅̅̅̅̅/2
𝑚+𝛼2 𝛾 𝑆,𝑅̅̅̅̅̅̅/2
, 1(𝑎, 𝑏; 𝑐; 𝑧)2
𝐹
is the Gaussian Hypergeometric function [36]. and Γ(𝑥) is
the Gamma function [36], 𝛾𝑆,𝑅̅̅̅̅̅ is the relay’s average SNR in the source-relay link. 𝑝𝑐𝑜𝑚(𝑒) is calculated by:
𝑝𝑐𝑜𝑚(𝑒) = 𝛼 ∫ 𝑓𝑥(𝑥|𝜂 𝑆,𝐷 ≤ 𝛾 𝑂)
∞
0
𝑄(√𝛽𝑥)𝑑𝑥 (21)
where 𝑥 = 𝜂 𝑆,𝐷 + 𝜂 𝑅,𝐷. Since 𝜂 𝑆,𝐷 is not comparable with 𝜂 𝑅,𝐷 at the MRC; thus, we will create a violation to
work simply on 𝜂 𝑅,𝐷 and therefore, 𝑝𝑐𝑜𝑚(𝑒) will be given as:
𝑝𝑐𝑜𝑚(𝑒) ≈ 𝛼 ∫ 𝑓𝜂 𝑅,𝐷
(𝜂 𝑅,𝐷|𝜂 𝑆,𝐷 ≤ 𝛾 𝑂)
∞
0
𝑄(√ 𝛽𝜂 𝑅,𝐷)𝑑𝜂 𝑅,𝐷 (22)
where
𝑓𝜂 𝑅,𝐷
(𝜂 𝑅,𝐷|𝜂 𝑆,𝐷 ≤ 𝛾 𝑂) = 𝑓𝜂 𝑅,𝐷
(𝜂 𝑅,𝐷) =
(𝑚)!
Γ(𝑚)
∑ 𝜋 𝑘 [
𝜆 𝑅,𝐷 𝜂 𝑅,𝐷
𝑚−1
(𝜂 𝑅,𝐷+𝜆 𝑅,𝐷)
𝑚+1]𝐿
𝑘=1 (23)
assuming that we have independent random variables [35].
The approximated expression of 𝑝𝑐𝑜𝑚(𝑒) is found by solving (22) utilizing the Prony estimation of
the Q-function with [36, (3.353.3)], and it is given as:
𝑝𝑐𝑜𝑚(𝑒) ≈
𝛼 𝑚!
√2𝜋Γ(1+𝑚)Γ(𝑚)
(
2
𝛽
)
𝑚
∑ 𝜋 𝑘(𝜆 𝑅,𝐷)
−𝑚𝐿
𝑘=1 𝐺 1,3
3,2
(
2
𝛽𝜆 𝑅,𝐷
|
−𝑚 ,1−𝑚,
1
2
−𝑚
0,−𝑚
) (24)
where 𝐺 𝑚,𝑛
𝑝,𝑞
(𝑧| 𝑎
𝑏
) is the Meijer G function [37]. Full derivation of 𝑝𝑐𝑜𝑚(𝑒) is provided in appendix B.
Equations (24), (20) and (18) can be substituted into (15) to get the expression of the BER.
3.4. OP analysis
Two events can properly describe the OP of the IR; when the DT is unsuccessful, a negative
feedback will be sent to the relay in order to request the source’s signal in the second time slot,
then, the destination will use MRC to enhance the received signal. However, in the second time slot,
there’s still a chance for the received signal to be in outage even if the relay is helping, and that is when
the two combined signals SNR are below the pre-defined threshold 𝛾𝑜.
Both events of the IR’s OP are represented by 𝑝 𝑜𝑢𝑡, as the following:
𝑝 𝑜𝑢𝑡 = Pr(𝜂 𝑆,𝐷 ≤ 𝛾𝑜) × 𝑃𝑟[min(𝛾𝑆,𝑅, 𝜂 𝑆,𝐷 + 𝜂 𝑅,𝐷 ≤ 𝛾𝑜|𝜂 𝑆,𝐷 ≤ 𝛾𝑜)]
= 𝑃𝑟(𝜂 𝑆,𝐷 ≤ 𝛾𝑜) [1 − 𝑃𝑟(𝜂 𝑆,𝐷 + 𝜂 𝑅,𝐷 > 𝛾𝑜|𝜂 𝑆,𝐷 ≤ 𝛾𝑜)] × 𝑃𝑟(𝛾𝑆,𝑅 > 𝛾𝑜|𝜂 𝑆,𝐷 ≤ 𝛾𝑜)
= 𝑃𝑟(𝜂 𝑆,𝐷 ≤ 𝛾𝑜) × [1 −
𝑃 𝑟(𝜂 𝑆,𝐷≤𝛾 𝑜)−𝑃 𝑟(𝜂 𝑆,𝐷+ 𝜂 𝑅,𝐷≤𝛾 𝑜)
𝑃 𝑟(𝜂 𝑆,𝐷≤𝛾 𝑜)
𝑃𝑟(𝛾𝑆,𝑅 > 𝛾𝑜)] (25)
It is worth to mentioning that the two OP events are contained in the operator min(•|•), i.e., the first
term is the relay’s outage, however, the second term signifies the destination’s outage. By simplifying
the previous formula, we get:
𝑝 𝑜𝑢𝑡 = Pr(𝛾𝑆,𝑅 ≤ 𝛾𝑜) Pr(𝜂 𝑆,𝐷 ≤ 𝛾𝑜) + Pr(𝛾𝑆,𝑅 > 𝛾𝑜) Pr(𝜂 𝑆,𝐷 + 𝜂 𝑅,𝐷 ≤ 𝛾𝑜) (26)
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5316 - 5328
5322
When the relay is helping, the MRC is used at the destination. At that time, the value of 𝜂 𝑆,𝐷 is
going to be much less than 𝜂 𝑅,𝐷; because of the diffeciencies of the DT. Intuitively, this leads to omitting 𝜂 𝑆,𝐷
from (26) which yields to the approximated OP expression, as the following:
𝑝 𝑜𝑢𝑡 ≈
𝛾(𝑚,𝑚
𝛾 𝑜
𝛾 𝑆,𝑅̅̅̅̅̅̅̅
)
Γ(𝑚)
(𝑚−1)!
Γ(𝑚)
∑ 𝜋 𝑘 (
𝛾 𝑜
𝜆 𝑆,𝐷
)
𝑚
𝐿
𝑘=1 𝐹12 (𝑚 + 1, 𝑚; 𝑚 + 1; −
𝛾 𝑜
𝜆 𝑆,𝐷
)
+ [1 −
𝛾(𝑚,𝑚
𝛾 𝑜
𝛾 𝑆,𝑅̅̅̅̅̅̅̅
)
Γ(𝑚)
]
(𝑚−1)!
Γ(𝑚)
∑ 𝜋 𝑘 (
𝛾 𝑜
𝜆 𝑅,𝐷
)
𝑚
𝐹12 (𝑚 + 1, 𝑚; 𝑚 + 1; −
𝛾 𝑜
𝜆 𝑅,𝐷
)𝐿
𝑘=1 (27)
where M=L is the number of interferers close to the destination, γ(a,b) is the Incomplete Gamma
function [36].
4. RESULTS AND DISCUSSION
In this part of the paper, the performance of a DF-IR system in Nakagami-m fading environment
with unique interferers near the destination is examined. Varying L along with 𝛾𝑜 and interferers 𝛾’s would
impact the system’s performance; this is clarified by showing which parameter has affected the performance
more severely. Figure 2 displays the influence of altering the threshold value on the BER for BPSK
modulation with three interferers using m=3 and 𝛾1=7 dB, 𝛾2=10 dB, and 𝛾3=13 dB. From this figure,
if the threshold value decreases, then the system’s BER will be enhanced.
Figure 3 shows the impact of altering 𝛾𝑜 and the interferers 𝛾’s on the BER for BPSK modulation
with three interferers (L=3) and fading severity parameter m=3. In this figure, if the threshold values
increase, then the system’s performance is going to be diminished. For instance, a system with (𝛾𝑜=10 dB,
𝛾1=7 dB, 𝛾2=10 dB and 𝛾3=13 dB) will act worse than a system with (𝛾𝑜=10 dB, 𝛾1=2 dB, 𝛾2=5 dB and
𝛾3=7 dB).
Figure 2. BER for BPSK modulation for various 𝛾0’s
and (L=3, m=3, 𝛾1=7 dB, 𝛾2=10 dB, and 𝛾3=13 dB)
Figure 3. BER for BPSK modulation for various
interferers γ’s and, (L = m = 3)
Figure 4 defines the effects of increasing L on the BER of the system for BPSK using m=3, 𝛾𝑜=10
dB, 𝛾1=7 dB, 𝛾2=10 dB, and 𝛾3=13 dB. From this figure, as L increases, the system’s BER is going to be
severely degraded in reflection to the increase in co-channel interference. To demonstrate this, we say,
for a 10−2
BER, a system with (L=1) is better than a system with (L=3) by (17 dB).
Figure 5 displays the BER against SNR of different m values with three destination-interferers and
𝛾𝑜=10 dB, 𝛾1=7 dB, 𝛾2=10 dB, and 𝛾3=13 dB. In the figure, the system’s BER improves, when the fading
severity parameter (m) increases. To show this, we say, for a 10−2
BER, a system with (m=4) transcends
a system with (m=2) by (2 dB).
8. Int J Elec & Comp Eng ISSN: 2088-8708
Performance evaluation of decode and forward cooperative diversity systems …. (Mamoun F. Al-Mistarihi)
5323
Figure 4. BER for BPSK modulation for various
numbers of interferers (L=1, 3), m=3, 𝛾𝑜=10dB,
𝛾1=7 dB, 𝛾2=10 dB, and 𝛾3=13 dB
Figure 5. BER for various m values and, (L = 3,
𝛾𝑜=10dB, 𝛾1=7 dB, 𝛾2=10 dB, and 𝛾3=13 dB)
As Figure 6 illustrates, as 𝛾𝑜 decreases, the OP will be upgraded. For example, given that the OP is
0.25, a system with 𝛾𝑜=13 dB would need to increase about 6 dB to act like another one with 𝛾𝑜=7dB.
This behavior happens for the following reason; as 𝛾𝑜 decreases, the source-destination link is going to be
less likely in outage and the relay-destination link is going to be used less frequently. Figure 7 shows
the effect of the interferers γ’s on the outage probability. From the figure, one can see that a system with
(𝛾𝑜=10 dB, 𝛾1=10 dB, 𝛾2=13 dB and 𝛾3=15 dB) will act worse than a system with (𝛾𝑜=10 dB, 𝛾1=2 dB, 𝛾2=5
dB and 𝛾3=7 dB).
Figure 6. OP for various values of 𝛾𝑜, and (L=1,
m=3, 𝛾1=7 dB, 𝛾2=10 dB and 𝛾3=13 dB)
Figure 7. OP for various values of interferers 𝛾’s and
(L=m=3, 𝛾𝑜=10 dB)
Figure 8 shows the situation where we got several interferers close to the destination; clearly,
the co-channel interference is going to increase the system’s OP as L increases. For instance, we might
compare two systems, one with (L=3) and the other with (L=1), and (𝛾𝑜=10 dB, 𝛾1=7 dB, 𝛾2=10 dB and
𝛾3=13 dB) for the OP of 0.3, there’s about 20 dB difference in the SNR which confirms that the co-channel
interference is going to impair the system’s performance.
Figure 9 illustrates the OP versus SNR for various values of m with one interferer and 𝛾𝑜=10 dB,
𝛾1=7 dB, 𝛾2=10 dB, and 𝛾3=13 dB. As realized in this figure, the increment of the fading severity parameter
(m) is going to enhance the system’s performance by means of OP. For instance, for OP of 0.1, a system with
(m=4) surpasses a different one with (m=1) by (3 dB).
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5316 - 5328
5324
Figure 8. OP for various values of L and (m=3,
𝛾𝑜=10 dB, 𝛾1=7 dB, 𝛾2=10 dB and 𝛾3=13 dB)
Figure 9. OP for various values of m and, (L = 1,
𝛾𝑜=10dB, 𝛾1=7 dB, 𝛾2=10 dB, and 𝛾3=13 dB)
5. CONCLUSION
The performance of a DF-IR system throughout a Nakagami-m fading channel with unique interferers
near the destination was evaluated. The evaluation clarified the impact of the change in the threshold 𝛾𝑜 and in
the co-channel interference on the system’s BER and OP. Efficient use of the channel’s bandwidth is guaranteed
by achieving spatial diversity in IR systems. A derivation of the BER and OP formulas was proposed in this
study. Outcomes have shown that if the order of the Nakagami-m fading channel decreases and the number of
interferes increases, the system’s BER and OP will get weakened. Moreover, there is a huge effect of 𝛾𝑜 and
the interferers 𝛾’s on the performance of the analyzed system.
APPENDIX
A. Derivation of 𝑷 𝒅𝒊𝒓𝒆𝒄𝒕(𝒆)
The expression of 𝑃𝑑𝑖𝑟𝑒𝑐𝑡(𝑒) is denoted as:
𝑃𝑑𝑖𝑟𝑒𝑐𝑡(𝑒) = ∫ 𝑃𝑑𝑖𝑟𝑒𝑐𝑡(𝑒|𝜂)𝑓𝜂 𝑆,𝐷
(𝜂|𝜂 𝑆,𝐷 > 𝛾𝑜)𝑑𝜂
∞
0
(A.1)
The conditional PDF 𝑓𝜂 𝑆,𝐷
(𝜂|𝜂 𝑆,𝐷 > 𝛾𝑜) is given as:
𝑓𝜂 𝑆,𝐷
(𝜂|𝜂 𝑆,𝐷 > 𝛾𝑜) =
𝑓𝜂 𝑆,𝐷
(𝜂 𝑆,𝐷)
1−𝐹 𝜂 𝑆,𝐷
(𝛾 𝑜)
= {
0 , 𝜂 ≤ 𝛾𝑜
𝜌 ∑ 𝜋 𝑘
𝐿
𝑘=1 𝜆 𝑆,𝐷 [
𝜂 𝑆,𝐷
𝑚−1
(𝜂 𝑆,𝐷+𝜆 𝑆,𝐷)
𝑚+1] , 𝜂 ≥ 𝛾𝑜
(A.2)
where
𝜌 =
(𝑚)!
[Γ(𝑚)−(𝑚−1)! ∑ 𝜋 𝑘(
𝛾 𝑜
𝜆 𝑆,𝐷
)
𝑚
1(𝑚+1,𝑚;𝑚+1;−
𝛾 𝑜
𝜆 𝑆,𝐷
)2
𝐹𝐿
𝑘=1 ]
(A.3)
Substitution (A.2) into (A.1) to get
𝑃𝑑𝑖𝑟𝑒𝑐𝑡(𝑒) = ∫ 𝛼 𝑄(√ 𝛽𝜂 𝑆,𝐷)𝜌 ∑ 𝜋 𝑘
𝐿
𝑘=1 𝜆 𝑆,𝐷 [
𝜂 𝑆,𝐷
𝑚−1
(𝜂 𝑆,𝐷+𝜆 𝑆,𝐷)
𝑚+1] 𝑑𝜂 𝑆,𝐷
∞
𝛾 𝑜
= 𝛼𝜌 ∑ 𝜋 𝑘
𝐿
𝑘=1 𝜆 𝑆,𝐷 ∫ 𝑄(√ 𝛽𝜂 𝑆,𝐷) [
𝜂 𝑆,𝐷
𝑚−1
(𝜂 𝑆,𝐷+𝜆 𝑆,𝐷)
𝑚+1] 𝑑𝜂 𝑆,𝐷
∞
𝛾 𝑜
(A.4)
Using the Prony’s approximation of the Q-function
10. Int J Elec & Comp Eng ISSN: 2088-8708
Performance evaluation of decode and forward cooperative diversity systems …. (Mamoun F. Al-Mistarihi)
5325
𝑄(𝑥) ≈ ∑ 𝐴𝑖 𝑒−𝑎 𝑖 𝑥 𝑞𝑝
𝑖=1 (A.5)
where 𝑥 = √ 𝛽𝜂 𝑆,𝐷, 𝑝 = 𝑞 = 2, 𝐴1 = 0.208, 𝐴2 = 0.147, 𝑎1 = 0.971, 𝑎2 = 0.525.
𝑃𝑑𝑖𝑟𝑒𝑐𝑡(𝑒) becomes:
𝑃𝑑𝑖𝑟𝑒𝑐𝑡(𝑒) = 𝛼𝜌 ∫ ∑ 𝐴𝑖
𝑝
𝑖=1 𝑒−𝑎 𝑖 𝛽𝜂 𝑆,𝐷 ∑ 𝜋 𝑘
𝐿
𝑘=1 𝜆 𝑆,𝐷 [
𝜂 𝑆,𝐷
𝑚−1
(𝜂 𝑆,𝐷+𝜆 𝑆,𝐷)
𝑚+1] 𝑑𝜂 𝑆,𝐷
∞
𝛾 𝑜
= 𝛼𝜌 ∑ 𝐴𝑖 ∑ 𝜋 𝑘
𝐿
𝑘=1 𝜆 𝑆,𝐷
2
𝑖=1 ∫ [
𝜂 𝑆,𝐷
𝑚−1
𝑒
−𝑎 𝑖 𝛽𝜂 𝑆,𝐷
(𝜂 𝑆,𝐷+𝜆 𝑆,𝐷)
𝑚+1] 𝑑𝜂 𝑆,𝐷
∞
𝛾 𝑜
(A.6)
Define:
𝐼 = ∫ [
𝜂 𝑆,𝐷
𝑚−1
𝑒
−𝑎 𝑖 𝛽𝜂 𝑆,𝐷
(𝜂 𝑆,𝐷+𝜆 𝑆,𝐷)
𝑚+1] 𝑑𝜂 𝑆,𝐷
∞
𝛾 𝑜
(A.7)
Using [36, (3.353.1)], I will be as:
𝐼 = ∑
(−𝑎 𝑖 𝛽) 𝑛
𝑛!
[
𝑒−(𝑛+𝑚)𝛾 𝑜
𝑚!
∑
(𝑗−1)! (−𝑛−𝑚) 𝑚−𝑗
(𝛾 𝑜+𝜆 𝑆,𝐷) 𝑗
𝑚
𝑗=1 −
(−𝑛−𝑚) 𝑚
𝑚!
𝑒(𝑛+𝑚)𝜆 𝑆,𝐷 𝐸𝑖[−(𝑛 + 𝑚)(𝛾𝑜 + 𝜆 𝑆,𝐷)]]∞
𝑛=0 (A.8)
Substituting (A.8) into (A.6), the approximated expression of 𝑃𝑑𝑖𝑟𝑒𝑐𝑡(𝑒) is given as:
𝑃𝑑𝑖𝑟𝑒𝑐𝑡(𝑒) = 𝛼𝜌 ∑ 𝐴𝑖 ∑ 𝜋 𝑘
𝐿
𝑘=1 𝜆 𝑆,𝐷 ∑
(−𝑎 𝑖 𝛽) 𝑛
𝑛!
∞
𝑛=0
2
𝑖=1 × [
𝑒−(𝑛+𝑚)𝛾 𝑜
𝑚!
∑
(𝑗−1)! (−𝑛−𝑚) 𝑚−𝑗
(𝛾 𝑜+𝜆 𝑆,𝐷) 𝑗
𝑚
𝑗=1 −
(−𝑛−𝑚) 𝑚
𝑚!
𝑒(𝑛+𝑚)𝜆 𝑆,𝐷 𝐸𝑖[−(𝑛 + 𝑚)(𝛾𝑜 + 𝜆 𝑆,𝐷)]] (A.9)
where 𝐸𝑖[𝑥] is the exponential integral function [36, (8.211.1)] and the terms 𝐴𝑖 and 𝑎𝑖 are the Prony
approximation parameters.
B. Derivation of 𝒑 𝒄𝒐𝒎(𝒆)
The expression of 𝑝𝑐𝑜𝑚(𝑒) is denoted as:
𝑝𝑐𝑜𝑚(𝑒) = 𝛼 ∫ 𝑓𝑥(𝑥|𝜂 𝑆,𝐷 ≤ 𝛾 𝑂)
∞
0
𝑄(√𝛽𝑥)𝑑𝑥 (B.1)
𝑥 = 𝜂 𝑆,𝐷 + 𝜂 𝑅,𝐷
A transgression will be made on the random variable 𝑥 to work merely on 𝜂 𝑅,𝐷. Since 𝜂 𝑅,𝐷 will be
much greater than 𝜂 𝑆,𝐷 to get the approximated expression of 𝑝𝑐𝑜𝑚(𝑒) as follows:
𝑝𝑐𝑜𝑚(𝑒) ≈ 𝛼 ∫ 𝑓𝜂 𝑅,𝐷
(𝜂 𝑅,𝐷|𝜂 𝑆,𝐷 ≤ 𝛾 𝑂)
∞
0
𝑄(√𝛽𝜂)𝑑𝜂 𝑅,𝐷 (B.2)
The conditional PDF 𝑓𝜂 𝑅,𝐷
(𝜂 𝑅,𝐷|𝜂 𝑆,𝐷 ≤ 𝛾 𝑂) is given as:
𝑓𝜂 𝑅,𝐷
(𝜂 𝑅,𝐷|𝜂 𝑆,𝐷 ≤ 𝛾 𝑂) = 𝑓𝜂 𝑅,𝐷
(𝜂 𝑅,𝐷) =
(𝑚)!
Γ(𝑚)
∑ 𝜋 𝑘 [
𝜆 𝑅,𝐷 𝜂 𝑅,𝐷
𝑚−1
(𝜂 𝑅,𝐷+𝜆 𝑅,𝐷)
𝑚+1]𝐿
𝑘=1 (B.3)
Substituting (B.3) into (B.2):
𝑝𝑐𝑜𝑚(𝑒) ≈ 𝛼 ∫ 𝑄(√ 𝛽𝜂 𝑅,𝐷)
(𝑚)!
Γ(𝑚)
∑ 𝜋 𝑘
𝐿
𝑘=1 𝜆 𝑅,𝐷 [
𝜂 𝑅,𝐷
𝑚−1
(𝜂 𝑅,𝐷+𝜆 𝑅,𝐷)
𝑚+1]
∞
0
𝑑𝜂 𝑅,𝐷
≈ 𝛼
(𝑚)!
Γ(𝑚)
∑ 𝜋 𝑘
𝐿
𝑘=1 𝜆 𝑅,𝐷 ∫ 𝑄(√ 𝛽𝜂 𝑅,𝐷) [
𝜂 𝑅,𝐷
𝑚−1
(𝜂 𝑅,𝐷+𝜆 𝑅,𝐷)
𝑚+1]
∞
0
𝑑𝜂 𝑅,𝐷 (B.4)
Define:
11. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5316 - 5328
5326
𝐼 = ∫ 𝑄(√ 𝛽𝜂 𝑅,𝐷) [
𝜂 𝑅,𝐷
𝑚−1
(𝜂 𝑅,𝐷+𝜆 𝑅,𝐷)
𝑚+1]
∞
0
𝑑𝜂 𝑅,𝐷 (B.5)
Using
𝑄(√ 𝛼𝛾) =
1
√2𝜋
𝐺 2,0
1,2
(
𝛼𝛾
2
|
1
0,
1
2
) (B.6)
1
(1+
𝛾
𝛼
)
𝑀 =
1
Γ(𝑀)
𝐺 1,1
1,1
(
𝛾
𝛼
| 1−𝑀
0
) (B.7)
Based on (B.6) and (B.7),
𝑄(√ 𝛽𝜂 𝑅,𝐷) =
1
√2𝜋
𝐺 2,0
1,2
(
𝛽𝜂 𝑅,𝐷
2
|
1
0,
1
2
) (B.8)
1
(𝜂 𝑅,𝐷+𝜆 𝑅,𝐷)
𝑚+1 =
1
(𝜆 𝑅,𝐷)
𝑚+1
1
(1+
𝜂 𝑅,𝐷
𝜆 𝑅,𝐷
)
𝑚+1 =
1
(𝜆 𝑅,𝐷)
𝑚+1
1
Γ(𝑚+1)
𝐺 1,1
1,1
(
𝜂 𝑅,𝐷
𝜆 𝑅,𝐷
| −𝑚
0
) (B.9)
Substituting (B.5), (B.8), and (B.9) into (B.4), we get:
𝑝𝑐𝑜𝑚(𝑒) ≈ 𝛼
(𝑚)!
Γ(𝑚)
1
√2𝜋
1
Γ(𝑚+1)
∑ 𝜋 𝑘
𝐿
𝑘=1 𝜆 𝑅,𝐷
1
(𝜆 𝑅,𝐷)
𝑚+1 ∫ 𝜂 𝑅,𝐷
𝑚−1
𝐺 2,0
1,2
(
𝛽𝜂 𝑅,𝐷
2
|
1
0,
1
2
) 𝐺 1,1
1,1
(
𝜂 𝑅,𝐷
𝜆 𝑅,𝐷
| −𝑚
0
)
∞
0
𝑑𝜂 𝑅,𝐷
≈
𝛼(𝑚)!
√2𝜋Γ(𝑚)Γ(𝑚+1)
∑ 𝜋 𝑘
𝐿
𝑘=1 𝜆 𝑅,𝐷
−𝑚
∫ 𝜂 𝑅,𝐷
𝑚−1
𝐺 2,0
1,2
(
𝛽𝜂 𝑅,𝐷
2
|
1
0,
1
2
) 𝐺 1,1
1,1
(
𝜂 𝑅,𝐷
𝜆 𝑅,𝐷
| −𝑚
0
)
∞
0
𝑑𝜂 𝑅,𝐷 (B.10)
Using [37, (07.34.21.0011.01)], the approximated expression of 𝑝𝑐𝑜𝑚(𝑒) is given as:
𝑝𝑐𝑜𝑚(𝑒) ≈
𝛼(𝑚)!
√2𝜋Γ(𝑚)Γ(𝑚+1)
(
2
𝛽
)
𝑚
∑ 𝜋 𝑘 𝜆 𝑅,𝐷
−𝑚𝐿
𝑘=1 𝐺 1,3
3,2
(
2
𝛽𝜆 𝑅,𝐷
|
−𝑚 ,1−𝑚,
1
2
−𝑚
0,−𝑚
) (B.11)
REFERENCES
[1] M. O. Hasna and M. S. Alouini, “End-to-end performance of transmission systems with relays over Rayleigh-
fading channels,” IEEE Transactions on Wireless Communications, vol. 2, no. 6, pp. 1126-1131, 2003.
[2] K. A. Darabkh, et al., “BPA-CRP: A Balanced Power-Aware Clustering and Routing Protocol for Wireless Sensor
Networks,” Ad Hoc Networks, vol. 82, pp. 155-171, Jan. 2019.
[3] K. A. Darabkh, et al., “A generic buffer occupancy expression for stop-and-wait hybrid automatic repeat request
protocol over unstable channels,” Telecommunication Systems, vol. 63, no. 2, pp. 205-221, 2016.
[4] K. A. Darabkh, “Fast and Upper Bounded Fano Decoding Algorithm: Queuing Analysis,” Transactions on
Emerging Telecommunications Technologies, vol. 28, no. 1, pp. 1-12, 2017.
[5] K. A. Darabkh, “Evaluation of Channel Adaptive Access Point System with Fano Decoding,” International Journal
of Computer Mathematics, vol. 88, no. 5, pp. 916-937, 2011.
[6] K. A. Darabkh, et al., “New Arriving Process for Convolutional Codes with Adaptive Behavior,” International
Multi-conference on Systems, Signals, and Devices, Chemnitz, Germany, pp. 1-6, 2012.
[7] K. A. Darabkh and B. N. Abu-Jaradeh, “Buffering Study over Intermediate Hops including Packet
Retransmission,” 2010 International Conference on Multimedia Computing and Information Technology (MCIT-
2010), Sharjah, U.A.E, pp. 45-48, 2010.
[8] K. A. Darabkh and B. N. Abu-Jaradeh, “Bounded Fano Decoders over Intermediate Hops Excluding Packet
Retransmission,” 2010 24th International Conference on Advanced Information Networking and Applications
(AINA 2010), Perth, Australia, pp. 299-303, 2010.
[9] K. A. Darabkh and W. D. Pan, “Queueing Simulation for Fano Decoders with Finite Buffer Capacity,” Proceedings
of the 9th Communications and Networking Simulation Symposium Conference (CNSS'06), Huntsville, Alabama,
Apr. 2006.
[10] R. T. Al-zubi, et al., “Outage Performance of Cognitive Two-Way Amplify-and-Forward Relay Network under
Different Transmission Schemes,” Transactions on Emerging Telecommunications Technologies, 2020.
[11] R. Saifan, et al., “Probabilistic and Deterministic Path Selection in Cognitive Radio Network,” IET
Communications, vol. 13, no. 17, p. 2767-2777, Oct. 2019.
[12] K. A. Darabkh, et al., “A-Z Overview of the In-Band Full-Duplex Cognitive Radio Networks,” Computer
Communications, vol. 145, pp. 66-95, Sep. 2019.
12. Int J Elec & Comp Eng ISSN: 2088-8708
Performance evaluation of decode and forward cooperative diversity systems …. (Mamoun F. Al-Mistarihi)
5327
[13] F. H. P. Fitzek and M. D. Katz, “Cooperation in wireless networks: principles and applications,” Springer, 2006.
[14] M. K. Simon and M. S. Alouini, “Digital Communication over Fading Channels,” John Wiley and Sons,
New York, NY, USA, 2000.
[15] J. N. Laneman, et al., “Cooperative diversity in wireless networks: efficient protocols and outage behavior,” IEEE
Transactions on Information Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
[16] Z. Yi and I. M. Kim, “Diversity order analysis of the decode-and-forward cooperative networks with relay
selection,” IEEE Transactions on Wireless Communications, vol. 7, no. 5, pp. 1792-1799, 2008.
[17] X. Zhang, et al., “Performance analysis of relay assignment schemes for cooperative networks with multiple
source-destination pairs,” IEEE Transactions on Wireless Communications, vol. 11, no. 1, pp. 166-177, 2012.
[18] P. A. Anghel and M. Kaveh, “Exact symbol error probability of a cooperative network in a Rayleigh-fading
environment,” IEEE Transactions on Wireless Communications, vol. 3, no. 5, pp. 1416-1421, Sep. 2004.
[19] M. F. Al-Mistarihi, et al., “Performance evaluation of multiuser diversity in multiuser two-hop cooperative multi-
relay wireless networks using maximal ratio combining over Rayleigh fading channels,” International Journal of
Communication Systems, vol. 28, no. 1, pp. 71-90, 2015.
[20] M. M. Harb and M. F. Al-Mistarihi, “Dual Hop Differential Amplify-and-Forward Relaying with Selection
Combining Cooperative Diversity over Nakagami-m Fading Channels,” 2016 8th IEEE International Conference
on Communication Software and Networks (ICCSN), Beijing, China, pp. 225-228, 2016.
[21] S. Al-Zoubi, et al., “On the Outage Probability of DF Relay Selection Cooperative Wireless Networks over
Nakagami-m Fading Channels,” 2016 7th International Conference on Information and Communication Systems
(ICICS), Irbid, Jordan, 2016.
[22] M. F. Al-Mistarihi, et al., “BER Analysis in Dual Hop Differential Amplify-and-Forward Relaying Systems with
Selection Combining Using M-ary Phase-Shift Keying over Nakagami-m Fading Channels,” in Galinina O., et al.
(eds), “Internet of Things, Smart Spaces, and Next Generation Networks and Systems,” NEW2AN/ruSMART 2019,
Lecture Notes in Computer Science, vol. 11660, 2019.
[23] M. F. Al-Mistarihi, et al., “Performance of Relay-Based Decode and Forward Cooperative Diversity Systems over
Rayleigh Fading Channels with Non-Identical Interferers,” IET Communications, vol. 13, no. 19, pp. 3135-3144,
Nov. 2019.
[24] M. Hlayel, et al., “Closed-form Expression of Bit Error Rate in Dual-Hop Dual-Branch Mixed Relaying
Cooperative Networks with Best-Path Selection over Rayleigh Fading Channels,” 2014 IEEE 11th International
Multi-Conference on Systems, Signals & Devices (SSD 2014), Castelldefels-Barcelona, Spain, 2014.
[25] M. F. Al-Mistarihi, et al., “BER Analysis in Relay-Based DF Cooperative Diversity Systems over Rayleigh Fading
Channels with Non-Identical Interferers near the Destination,” 2019 International Conference on Advanced
Communication Technologies and Networking (CommNet), Rabat, Morocco, pp. 1-5, 2019.
[26] S. S. Ikki and M. H. Ahmed, “Performance analysis of cooperative diversity wireless networks over Nakagami-m
fading channel,” IEEE Communications Letters, vol. 11, no. 4, pp. 334-336, Apr. 2007.
[27] R. Mohaisen and M. F. Al-Mistarihi, “Performance Evaluation of Bit Error Rate in Relay-Based Cooperative
Diversity Systems over Rayleigh Fading Channels with Interference,” 11th International Conference on
Wired/Wireless Internet Communications (WWIC 2013), Saint-Petersburg, Russia, pp. 241-250, 2013.
[28] R. Mohaisen and M. F. Al-Mistarihi, “Closed-form Expression for Outage Probability in Relay-Based Cooperative
Diversity Systems over Rayleigh Fading Channels with Interference,” 2013 3rd International Conference on
Communications and Information Technology (ICCIT 2013), Beirut, Lebanon, pp. 300-303, 2013.
[29] S. S. Ikki and M. H. Ahmed, “Performance of multiple-relay cooperative diversity systems with best relay selection
over Rayleigh fading channels,” EURASIP Journal on Advances in Signal Processing, 2008.
[30] S. S. Ikki and M. H. Ahmad, “Performance Analysis of Decode-and-Forward Incremental Relaying Cooperative-
Diversity Networks over Rayleigh Fading Channels,” IEEE 69th Vehicular Technology Conference
(VTC-Spring’09), Barcelona, Spain, pp. 1-6, 2009.
[31] A. M. Hayajneh, et al., “Incremental-Relaying Cooperative-Networks using Dual Transmit Diversity and Decode
and Forward Relaying Scheme with Best Relay Selection,” 2014 37th Jubilee International Convention on
Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 2014.
[32] M. F. Al-Mistarihi, et al., “Closed-form Expression for Outage Probability in Relay-Based Cooperative Diversity
Systems over Multipath Fading Channels with Interference,” 2014 IEEE 11th International Multi-Conference on
Systems, Signals & Devices (SSD 2014), Castelldefels-Barcelona, Spain, pp. 1-5, 2014.
[33] A. Magableh, et al., “Closed-form Expression for Bit Error Rate in Relay-Based Cooperative Diversity Systems
over Multipath Fading Channels with Interference,” 2013 9th International Wireless Communications and Mobile
Computing (IWCMC 2013), Sardinia, Italy, Jul. 2013.
[34] M. F. Al-Mistarihi, et al., “Closed-form Expression for BER in Relay-Based DF Cooperative Diversity Systems
over Nakagami-m Fading Channels with Non-Identical Interferers,” in Internet of Things, Smart Spaces, and Next
Generation Networks and Systems, pp. 700-709, 2019.
[35] A. Papoulis and S. U. Pillai, “Probability, Random Variables, and Stochastic Processes,” 4th edition, New York,
McGraw-Hill, 2002.
[36] I. S. Gradshteyn and I. M. Ryzhik, “Table of Integrals, Series, and Products,” 7th edition, Academic Press, 2007.
[37] Miejer‟s G-Function, “The wolfram functions site,” 2001. [Online]. Available:
http://functions.wolfram.com/07.34.21.0011.01.
13. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5316 - 5328
5328
BIOGRAPHIES OF AUTHORS
Mamoun F. Al-Mistarihi received the B.Sc. and M.Sc. degrees in Electrical Engineering from
Jordan University of Science and Technology, Irbid, Jordan, M.E.E. and Ph.D. degrees in
Electrical Engineering from University of Minnesota, Minneapolis, MN, USA, in 1992, 1996,
2005, and 2005, respectively. From 1994 to 2000, he was with the Royal Scientific Society,
Amman, Jordan. Presently he is an Associate Professor with the Electrical Engineering
Department, Jordan University of Science and Technology, Irbid, Jordan. His research interests
include digital signal processing, image processing, digital signal processing for
communications, wireless communications and mobile networks, performance evaluation of
wireless communication systems over fading channels, security of wireless systems, WiMAX,
wireless Ad Hoc networks, and wireless sensor networks.
Rami Mohaisen received the B.Sc. and M.Sc. degrees in Electrical Engineering from Jordan
University of Science and Technology, Irbid, Jordan in 2010, and 2012, respectively.
His research interests include wireless communications, and communication networks.
Khalid A. Darabkh received the PhD degree in Computer Engineering from the University of
Alabama in Huntsville, USA, in 2007 with honors. He has joined the Computer Engineering
Department at the University of Jordan as an Assistant Professor since 2007 and has been
a Tenured Full Professor since 2016. He is engaged in research mainly on wireless sensor
networks, mobile-ad hoc networks, vehicular networks, flying ad hoc networks, queuing systems
and networks, multimedia transmission, Internet of things, cognitive radio networks, channel
coding, steganography and watermarking, as well as innovative and interactive learning
environments. He authored and co-authored of at least a hundred forty research articles and
served as a reviewer in many scientific journals and international conferences. Prof. Darabkh is
the recipient of 2016 Ali Mango Distinguished Researcher Reward for Scientific Colleges and
Research Centers in Jordan. He is further the recipient of the University of Jordan’s appreciation
certificate as of being the researcher who publish the highest number of quality manuscripts in
Scopus during 2018. As far as software certifications tracks are concerned, he is Sun Certified
Programmer for Java Platform (SCJP), Oracle Database Administrator Certified Associate
(OCA), as well as Oracle Java Developer Certified Trainer (OJDC-T). In fact, he serves on
the Editorial Board of Telecommunication Systems, published by Springer, Computer
Applications in Engineering Education, published by John Wiley & Sons, and Journal of High
Speed Networks, published by IOS Press. Additionally, he serves as a TPC member of highly
reputable IEEE conferences such as GLOBECOM, LCN, VTC-Fall, PIMRC, ISWCS, ATC,
ICT, and IAEAC. Moreover, he is a member of many professional and honorary societies,
including Eta Kappa Nu, Tau Beta Pi, Phi Kappa Phi, and Sigma XI. He was selected for
inclusion in the Who's Who Among Students in American Universities and Colleges and
Marquis Who's Who in the World. As administrative experience at the University of Jordan,
he served as Assistant Dean for Computer Affairs in the College of Engineering from Sept 2008
to Sept 2010. Additionally, he served as Acting Head of the Computer Engineering Department
from June 2010 to Sept 2012.