The power domain non-orthogonal multiple access (NOMA) technique introduces one of the fundamental characteristics and it exhibits the possibility of users to decode the messages of the other paired users on the same resources. In cognitive radio inspired NOMA (CR-NOMA), the base station (BS) has to serve untrusted users or users with different security clearance. This phenomenon raises a security threat particularly in such CR-NOMA. This paper develops a tractable analysis framework to evaluate the security performance of cooperative non-orthogonal multiple access (NOMA) in cognitive networks, where relay is able to serve two far NOMA users in the presence of external eavesdropper. In particular, we study the secrecy outage probability in a two-user NOMA system. This situation happens in practical the BS is pairing a legitimate user with another untrusted user. Main reason is that the non-uniform distribution in terms of trusted and untrusted users in the cell. By performing numerical results demonstrate the performance improvements of the proposed NOMA scheme in comparison to that of several situations in terms of different parameters. Furthermore, the security performance of NOMA is shown to verify the derived expressions.
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...cscpconf
Network-wide broadcasting is a fundamental operation for mobile ad hoc networks. Inbroadcasting, a source node sends a message to all other nodes in the network. Under ordinary
flooding procedure, each node transmits the broadcast message to all of its 1-hop downlinkneighbours, i.e. all nodes residing within its radio-range. Receiving the broadcast message all those downlink neighbours reply with an acknowledgement. Since in an ad hoc network a node
may have multiple uplink neighbours, in ordinary flooding procedure, a node is supposed to receive the broadcast message from all those uplink neighbours and send acknowledgement to all of them, generating huge message contention and collision. This is popularly referred to as
the broadcast storm problem. The present article is focused to remove the broadcast redundancy within 2-hop neighbourhood and beyond, as much as possible by prioritizing the 1-
hop downlink neighbours of a node. Priority of a 1-hop downlink neighbour of a node ni increases if it is equipped with a large number of 1-hop downlink neighbours, large radiorange,
high remaining battery power and very small number of uplink neighbours closer to the broadcast source than ni
. ni waits a predefined amount of time to receive proactive
acknowledgements from the 1-hop downlink neighbours having less priority. If it does not receive acknowledgement from those downlink neighbours within the waiting time, it sends the
broadcast message to them. A fuzzy controller named Priority Assignor (PA) is embedded in every node that determines the priority of a 1-hop downlink neighbour. Simulation results firmly
establish that the proposed protocol FP2 B produces high broadcast delivery ratio at muchlesser message cost, compared to other state-of-the-art broadcast algorithms.
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...ambitlick
This document discusses enhancing the downlink performance of wireless networks through simultaneous multiple packet transmission (MPT). MPT allows an access point to simultaneously transmit two packets to two distinct users, effectively doubling throughput. The paper formalizes scheduling packets for transmission as a maximum matching problem in a graph. It also presents a fast approximation algorithm for finding a matching and analyzes how MPT can increase maximum arrival rates and reduce packet delays.
Improving thrpoughput and energy efficiency by pctar protocol in wirelessIaetsd Iaetsd
The document discusses a proposed Prioritized Congestion and Traffic Aware Routing (PCTAR) protocol for wireless sensor networks. PCTAR aims to improve throughput and energy efficiency. It does so by dynamically discovering routing zones using hybrid potential fields that consider both depth (distance to sink) and queue length, as well as data priority. Simulation results showed PCTAR improved overall throughput by 70% compared to the TADR protocol. PCTAR is suitable for applications in healthcare monitoring and military domains by prioritizing data delivery and reducing congestion.
Design and Performance Evaluation Of Modulation Techniques Suitable For ADSL ...Ash Milan
This document discusses modulation techniques for ADSL modems. It begins with an abstract that introduces ADSL and the goal of evaluating modulation techniques to achieve high bandwidth.
The body of the document is divided into two main sections. The first section provides background on ADSL technology, including defining an ADSL modem and explaining how transmission rates vary based on distance from the local exchange.
The second section discusses modulation schemes used in ADSL modems, including phase-shift keying (PSK), quadrature amplitude modulation (QAM), and their basic receiver block diagrams. It provides equations to describe these modulation techniques.
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...IDES Editor
In this work, the end-to-end performance of an
amplify-and-forward multi-antenna infrastructure-based relay
(fixed relay) system over flat Rayleigh fading channel is
investigated. New closed form expressions for the statistics of
the received signal-to-noise ratio (SNR) are presented and
applied for studying the outage probability and the average
bit error rate of the digital receivers. The results reveal that
the system performance improves significantly (roughly 3 dB)
for M=2 over that for M=1 in both low and high signal-tonoise
ratio. However, little additional performance
improvement can be achieved for M>2 relative to M=2 at high
SNR.
This document proposes a physical-layer network coding (PNC) scheme to improve throughput in wireless networks. PNC takes advantage of the broadcast nature of wireless transmissions by allowing signals from multiple nodes to be combined at the physical layer through modulation and demodulation. It demonstrates PNC for a three-node wireless linear network. With PNC, the three nodes can exchange information in two time slots, improving throughput by 100% over traditional scheduling and 50% over straightforward network coding. PNC mapping provides a way to perform network coding operations on electromagnetic signals directly at the physical layer by mapping their combination to binary additions.
Adaptive Relay Scheme Based on Channel State in Dual-Hop SystemIJERA Editor
Conventional dual-hop scheme has used the same modulation method for the source and the relays. Given that
the distances between the source and the relays are close, in other words, when the quality of the source-relays
link is good, the usage of higher order modulation at the source improves total system throughput. However, in
opposite case, bit error probability is increased through using higher order modulation. Therefore, we propose a
relay scheme that uses hierarchical modulation at the source and adaptive modulation based on the channel state
at the relays. Accordingly, the symbol error rate (SER) and throughput performances are improved by the
proposed scheme
This document summarizes a research paper that proposes a secure routing protocol called CA-AOMDV for mobile ad hoc networks (MANETs). CA-AOMDV extends the AOMDV routing protocol to be aware of channel conditions and selects multiple disjoint paths based on predicted link lifetimes. It uses the Secure Hash Algorithm 1 (SHA-1) to guarantee integrity in the network. The paper reviews AOMDV and introduces how CA-AOMDV incorporates channel properties into route discovery and maintenance to choose more reliable paths based on predicted link lifetimes calculated from node speeds and a channel model.
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...cscpconf
Network-wide broadcasting is a fundamental operation for mobile ad hoc networks. Inbroadcasting, a source node sends a message to all other nodes in the network. Under ordinary
flooding procedure, each node transmits the broadcast message to all of its 1-hop downlinkneighbours, i.e. all nodes residing within its radio-range. Receiving the broadcast message all those downlink neighbours reply with an acknowledgement. Since in an ad hoc network a node
may have multiple uplink neighbours, in ordinary flooding procedure, a node is supposed to receive the broadcast message from all those uplink neighbours and send acknowledgement to all of them, generating huge message contention and collision. This is popularly referred to as
the broadcast storm problem. The present article is focused to remove the broadcast redundancy within 2-hop neighbourhood and beyond, as much as possible by prioritizing the 1-
hop downlink neighbours of a node. Priority of a 1-hop downlink neighbour of a node ni increases if it is equipped with a large number of 1-hop downlink neighbours, large radiorange,
high remaining battery power and very small number of uplink neighbours closer to the broadcast source than ni
. ni waits a predefined amount of time to receive proactive
acknowledgements from the 1-hop downlink neighbours having less priority. If it does not receive acknowledgement from those downlink neighbours within the waiting time, it sends the
broadcast message to them. A fuzzy controller named Priority Assignor (PA) is embedded in every node that determines the priority of a 1-hop downlink neighbour. Simulation results firmly
establish that the proposed protocol FP2 B produces high broadcast delivery ratio at muchlesser message cost, compared to other state-of-the-art broadcast algorithms.
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...ambitlick
This document discusses enhancing the downlink performance of wireless networks through simultaneous multiple packet transmission (MPT). MPT allows an access point to simultaneously transmit two packets to two distinct users, effectively doubling throughput. The paper formalizes scheduling packets for transmission as a maximum matching problem in a graph. It also presents a fast approximation algorithm for finding a matching and analyzes how MPT can increase maximum arrival rates and reduce packet delays.
Improving thrpoughput and energy efficiency by pctar protocol in wirelessIaetsd Iaetsd
The document discusses a proposed Prioritized Congestion and Traffic Aware Routing (PCTAR) protocol for wireless sensor networks. PCTAR aims to improve throughput and energy efficiency. It does so by dynamically discovering routing zones using hybrid potential fields that consider both depth (distance to sink) and queue length, as well as data priority. Simulation results showed PCTAR improved overall throughput by 70% compared to the TADR protocol. PCTAR is suitable for applications in healthcare monitoring and military domains by prioritizing data delivery and reducing congestion.
Design and Performance Evaluation Of Modulation Techniques Suitable For ADSL ...Ash Milan
This document discusses modulation techniques for ADSL modems. It begins with an abstract that introduces ADSL and the goal of evaluating modulation techniques to achieve high bandwidth.
The body of the document is divided into two main sections. The first section provides background on ADSL technology, including defining an ADSL modem and explaining how transmission rates vary based on distance from the local exchange.
The second section discusses modulation schemes used in ADSL modems, including phase-shift keying (PSK), quadrature amplitude modulation (QAM), and their basic receiver block diagrams. It provides equations to describe these modulation techniques.
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...IDES Editor
In this work, the end-to-end performance of an
amplify-and-forward multi-antenna infrastructure-based relay
(fixed relay) system over flat Rayleigh fading channel is
investigated. New closed form expressions for the statistics of
the received signal-to-noise ratio (SNR) are presented and
applied for studying the outage probability and the average
bit error rate of the digital receivers. The results reveal that
the system performance improves significantly (roughly 3 dB)
for M=2 over that for M=1 in both low and high signal-tonoise
ratio. However, little additional performance
improvement can be achieved for M>2 relative to M=2 at high
SNR.
This document proposes a physical-layer network coding (PNC) scheme to improve throughput in wireless networks. PNC takes advantage of the broadcast nature of wireless transmissions by allowing signals from multiple nodes to be combined at the physical layer through modulation and demodulation. It demonstrates PNC for a three-node wireless linear network. With PNC, the three nodes can exchange information in two time slots, improving throughput by 100% over traditional scheduling and 50% over straightforward network coding. PNC mapping provides a way to perform network coding operations on electromagnetic signals directly at the physical layer by mapping their combination to binary additions.
Adaptive Relay Scheme Based on Channel State in Dual-Hop SystemIJERA Editor
Conventional dual-hop scheme has used the same modulation method for the source and the relays. Given that
the distances between the source and the relays are close, in other words, when the quality of the source-relays
link is good, the usage of higher order modulation at the source improves total system throughput. However, in
opposite case, bit error probability is increased through using higher order modulation. Therefore, we propose a
relay scheme that uses hierarchical modulation at the source and adaptive modulation based on the channel state
at the relays. Accordingly, the symbol error rate (SER) and throughput performances are improved by the
proposed scheme
This document summarizes a research paper that proposes a secure routing protocol called CA-AOMDV for mobile ad hoc networks (MANETs). CA-AOMDV extends the AOMDV routing protocol to be aware of channel conditions and selects multiple disjoint paths based on predicted link lifetimes. It uses the Secure Hash Algorithm 1 (SHA-1) to guarantee integrity in the network. The paper reviews AOMDV and introduces how CA-AOMDV incorporates channel properties into route discovery and maintenance to choose more reliable paths based on predicted link lifetimes calculated from node speeds and a channel model.
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETijfcstjournal
The main aim of this paper is to present comprehensive study on the performance and behavior of Ondemand
Distance Vector Routing approach (AODV), Table Driven Routing approach (DSDV) and Hybrid
Routing approach (ZRP) in VANETs. VANETs are an enhanced form of MANETs where moving nodes are
replaced by vehicles. This paper evaluates these protocols under realistic mobility models to analyze their
performance in VANETs. To evaluate the performance of given protocols, different set of scenarios with
varying nodes density have been simulated with the help of simulators NS-2, SUMO and MOVE.
This document summarizes a research paper that proposes a distributed protocol for assigning time slots in a wireless sensor network. The protocol has two phases: 1) Nodes fairly reserve multiple slots in a fixed frame to transmit data, so each node gets a fair share. 2) A centralized greedy algorithm is applied to reduce the frame length while ensuring each node gets at least one slot, making the frame as short as possible. Simulation results showed the protocol improves fairness of slot distribution and reduces frame length compared to an earlier algorithm.
The document proposes a new VLSI architecture for DSSS signal acquisition that uses Galois sequences. It summarizes that the proposed architecture provides improved signal acquisition at low SNR compared to existing architectures. The key blocks are a Galois sequence generator and QPSK modulation/demodulation. Simulation results on MATLAB and FPGA show the architecture requires low power and complexity while achieving comparatively better low SNR signal acquisition.
Performance analysis of papr reduction techniques in multicarrier modulation ...eSAT Journals
Abstract Orthogonal FrequencyDivisionMultiplexing (OFDM) is one of the many multicarrier modulation techniques which provide high spectral efficiency, less vulnerability to echoes,low implementation complexity and resilience to non – linear distortion. It is used in communication systems due to its various advantages. However, while this system is implemented problem of high peak – to – average power ratio(PAPR) is encountered. The reason behind this drawback is the existence of manyindependent subcarriers, due towhichthesignal amplitudecanhavehighpeakvalues as compared to average of whole system. The high PAPR in multicarrier transmission systems causes power degradation and spectrum spreading.Interleaving, Tone Reservation, Peak Reduction Carrier,Block Coding, Active Constellation Extension, Envelope ScalingareamongmanyPAPRreductionschemesthathavebeenproposedas a remedy to thisproblem. In this paper, performances of Amplitude Clipping and Filtering, Selected Level Mapping (SLM), and PartialTransmitSequence (PTS) techniques of PAPR reduction in OFDM systems by parameter variations are analyzed, based on Complementary Cumulative Distribution Function. An attempt has been made to simulate clipping and filtering technique with iterations and the simulation shows that PAPR problem is reduced as number of iterations increases. The attempts have also been made to simulate SLM technique and PTS technique by varying number of phase sequences, number of sub-blocks in SLM, PTS respectively and simulation results shows that by increasing the number of phase sequences, sub-blocks, PAPR can be reduced significantly.The mathematical equations are incorporated here to compute the maximum expected PAPR from an OFDM signal which shows when there is phase alignment of all sub carriers and sub carriers are equally modulated, then signal peak value hits the maximum. Besides these computer simulations, a comparative study of these three techniques is done.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes a study on the performance of turbo coded orthogonal frequency division multiplexing (OFDM) over fading channels. It describes how OFDM can mitigate inter-symbol interference caused by frequency selective fading channels by dividing the channel into parallel subchannels. It then provides details on turbo coding, including the encoder and iterative decoder design. The system model studied transmits a turbo coded OFDM signal over a frequency selective Rayleigh fading channel and evaluates the performance for rate 1/3 and 1/2 turbo codes. Simulation results are presented to analyze the bit error rate.
This document summarizes a research paper that evaluates the performance of the Dynamic Source Routing (DSR) routing protocol for Variable Bit Rate (VBR) multimedia traffic in mobile ad hoc networks (MANETs) using the Network Simulator 2 (NS-2). The paper conducts simulations of DSR under different scenarios by varying the terrain size, connection rate, and data send rate. It compares the performance of DSR and an enhanced version of DSR based on packet delivery ratio, average end-to-end delay, and optimal path length. The results show that the enhanced DSR performs better in terms of packet delivery but worse in terms of delay and path length compared to the original DSR protocol.
This document summarizes a research paper that proposes a method for identifying reliable nodes in an ad hoc wireless network to form stable routing paths. The method evaluates nodes based on their transmission range, signal strength, packet forwarding capacity, and position. Nodes meeting certain thresholds for these metrics are identified as reliable and added to a neighbor routing table. Simulation results showed this selective approach to identifying reliable nodes performed better than the traditional AODV routing protocol at maintaining stable routes in the face of node mobility.
Artificial Intelligence Based Mutual Authentication Technique with Four Entit...IDES Editor
4-G mobile communications system has utilized
high speed data communications technology having
connectivity to all sorts of networks including 2-G and 3-G
mobile networks. Authentication of mobile subscribers and
networks are a prime criterion to check and minimize security
threats and attacks. An artificial intelligence based mutual
authentication system with four entities is proposed. A person
talking salutation or greeting words in different times are
always consisting of a very narrow range of frequencies which
are varying in nature from person to person. Voice frequency
of the salutation or selective words used by a subscriber like
Hello, Good Morning etc is taken as first entity. Second entity
is chosen as frequency of flipping or clapping sound of the
calling subscriber. Then third entity is taken as face image of
the calling subscriber. Fourth entity is granted as probability
of salutation or greeting word from subscriber’s talking habit
(set of salutation words) while initializing a call. These four
entities such as probability of particular range of frequencies
for the salutation word, frequency of flipping sound, face
image matching of the subscriber, particular salutation or
greeting word at the time of starting a call are used with most
frequently, more frequently and less frequently by the calling
subscriber like uncertainty in Artificial Intelligence (AI). Now
different relative grades are assigned for most frequently,
more frequently and less frequently used parameters and the
grades are modified according to the assumed weightage. A
Fuzzy Rule (condition) by Fuzzy operation is invented. If the
results obtained from fuzzy operations are satisfied by the
fuzzy rule, the subscriber (MS) and the network (Switch or
Server) are mutually authenticated in 4-G mobile
communications.
This document proposes a physical-layer network coding (PNC) scheme to improve capacity in wireless networks. PNC takes advantage of the broadcast nature of wireless transmissions by allowing signals from multiple nodes to be combined at the receiver using network coding principles. Specifically:
- PNC coordinates transmissions so that signals from different nodes arrive simultaneously at the relay node, where they are combined using modulation mapping that performs network coding operations in the physical layer.
- This allows the relay node to transmit a single coded signal, requiring fewer time slots than schemes that avoid or separate interfering signals.
- In a basic three-node example network, PNC allows information exchange between the two outer nodes in two time slots, compared
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
Performance Analysis and Development of an Efficient Routing Scheme for IEEE ...IDES Editor
A collision-free centralized scheduling algorithm
for IEEE 802.16 WiMAX provides a mechanism for
creations multi-hop mesh and high-quality wireless
multimedia services which can be developed as a high speed
broad band wireless network. In centralized scheduling for
IEEE 802.16 mesh networks, all packets should be
transported through the BS (Base station).The links to or
from the BS becomes the system’s bottleneck and the
throughput is heavily impacted by the interference. To solve
this problem, we evaluated the proposed algorithm with five
selection criteria of scheduling through extensive simulations
and the experimental results are instrumental for improving
the performance of IEEE 802.16 based WMNs in terms of link
scheduling. We compared the effect of two routing and one
scheduling algorithm on the scheduling length. The result
shows that best algorithm has improved the system
performance in the aspects of scheduling length, transmission
range, and channel utilization ratio.
This document proposes a new two-level frequency hopping code division multiple access (FH-CDMA) scheme for wireless communication systems. The scheme partitions modulation codes and frequency hopping (FH) patterns, providing more flexibility than previous schemes. It divides the available bandwidth into multiple frequency bands. Data is encoded into symbols using modulation codes, then each symbol is represented by a unique FH pattern to determine the carrier frequency across bands over time. This two-level encoding allows supporting more users without increasing the number of FH patterns. Performance and spectral efficiency of the new scheme are analyzed and shown to achieve higher data rates and better efficiency than previous schemes under some conditions.
Mobility and Propagation Models in Multi-hop Cognitive Radio Networksszhb
This document discusses how mobility affects the performance of multi-hop cognitive radio networks under different propagation models. It summarizes the results of simulations run with the Network Simulator 2 (NS2) that tested free space, two-ray ground, and shadowing propagation models carrying MPEG4 video traffic over a cognitive radio network with mobile nodes. The key findings are: 1) Free space propagation provided the best throughput and lowest loss ratio compared to two-ray ground and shadowing models; 2) All propagation models performed significantly worse with mobile nodes compared to stationary nodes; 3) Mobility reduced average performance by disrupting signal strength and increasing noise as nodes moved.
The four basic Radio Resource Management (RRM) measurements in Long Term Evolution (LTE) system
are Channel Quality Indicator (CQI), Reference Signal Received Power (RSRP), Reference Signal
Received Quality (RSRQ), and Carrier Received Signal Strength Indicator (RSSI). A measurement of channel quality represented by Signal to Interference plus Noise Ratio (SINR) is used for link adaptation along with packet scheduling, whereas RSRP and RSRQ are needed for making handover decision during intra-eUTRAN (evolved Universal Terrestrial Random Access Network) handover in LTE. In this paper,
some practical measurement results recorded from a live LTE network of Australia using a commercial measurement tool namely NEMO Handy are analysed to verify the possible relationships among SINR, RSRP, RSSI and RSRQ as well as to evaluate the effects of SNR on throughput. In addition, the intraeUTRAN handover events occurred during the test period within the test area are studied. The analysis
yields some useful information such as: if the SINR is good for a measurement slot, higher throughput is
achieved; RSRP and SNR are proportional to each other on average; and lesser is the difference between
RSSI and RSRP, better is the RSRQ – each of which is consistent with theory. All the measurement results
are evaluated using computer programs built on MATLAB platform.
Iaetsd game theory and auctions for cooperation inIaetsd Iaetsd
This document summarizes game theory and auction approaches for encouraging cooperation in wireless networks. It first discusses how cooperative communication can improve wireless capacity by exploiting antennas across devices. However, applying cooperation is challenging because nodes lack incentives to help. The document surveys existing game theoretic solutions for providing cooperation incentives. It outlines classification of games, concepts like Nash equilibrium, and how game theory has been applied in contexts like the relay dilemma game and Stackelberg game to model node interactions and identify stable cooperation strategies.
This document proposes a new zone-based bandwidth allocation protocol for wireless networks. The key points are:
1. It divides the network into zones based on hop count from the initial relay station, and allocates bandwidth to each zone to improve quality of service.
2. Within each zone, the bandwidth allocated is distributed to mobile users based on their visiting probability and required bandwidth. This aims to maximize the average user satisfaction rate.
3. The protocol is evaluated through simulations using the Network Simulator 2 (NS2) tool. Results show the protocol improves bandwidth allocation efficiency and reduces quality of service degradation compared to other approaches.
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
This document analyzes MAC protocols for cognitive radio wireless sensor networks (CR-WSNs). It begins with an introduction to cognitive radio and how combining it with wireless sensor networks can yield new networking capabilities. It then discusses various MAC protocol layers and focuses on the COGMAC protocol. COGMAC is a decentralized cognitive MAC protocol based on the multichannel preamble reservation scheme. The document outlines COGMAC's advantages over conventional MAC protocols and introduces an upgraded version called COGMAC+. COGMAC+ uses adaptive energy detection and random backoff schemes to improve performance. Finally, the document summarizes that cognitive radio can improve spectrum utilization and quality in sensor networks by exploiting multiple channel availability and overcoming issues from dense deployments.
Enhancement and performance evaluation of a multicast routing mechanism in zi...Raja' Masa'deh
this presentation presents description of a paper "Enhancement and Performance Evaluation of a Multicast Routing Mechanism in ZigBee Cluster-tree Wireless Sensor Network".
This document analyzes and compares OFDMA and CDMA/WCDMA systems. It first discusses channel estimation techniques for OFDMA and CDMA, including minimum mean square error (MMSE) and least squares estimation. It then analyzes properties of OFDMA systems, including the effect of total power and cluster size on signal-to-interference plus noise ratio and signal-to-interference ratio. Finally, it compares the downlink capacities of OFDMA and WCDMA systems and proposes a new multiple access technique called OWCFDMA that combines advantages of both. The overall goal is to improve wireless communication system performance by integrating OFDMA and CDMA/WCDMA techniques.
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksTELKOMNIKA JOURNAL
1) The document compares the secrecy probability performance of amplify-and-forward non-orthogonal multiple access (AF-NOMA) networks and amplify-and-forward orthogonal multiple access (AF-OMA) networks in the presence of an eavesdropper.
2) It derives an upper bound expression for the strictly positive secrecy capacity (SPSC) of the AF-NOMA network, which represents the probability that the instantaneous secrecy rates are positive.
3) The analysis shows that the SPSC of NOMA is significantly lower than OMA due to the channel characterization of NOMA, but it can be improved by optimizing the power allocation coefficients.
Study on outage performance gap of two destinations on CR-NOMA networkTELKOMNIKA JOURNAL
This document studies the outage performance of two secondary destinations in a cognitive radio non-orthogonal multiple access (CR-NOMA) network. It presents a system model of a downlink dual-hop CR-NOMA network consisting of a primary destination, secondary source, relay, and two secondary destinations. It derives the exact outage probability expressions for the secondary users by obtaining the signal-to-interference-plus noise ratio and signal-to-noise ratio for each transmission. The results show that the performance gap between the two secondary users can be obtained due to different power allocation factors assigned to each user.
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETijfcstjournal
The main aim of this paper is to present comprehensive study on the performance and behavior of Ondemand
Distance Vector Routing approach (AODV), Table Driven Routing approach (DSDV) and Hybrid
Routing approach (ZRP) in VANETs. VANETs are an enhanced form of MANETs where moving nodes are
replaced by vehicles. This paper evaluates these protocols under realistic mobility models to analyze their
performance in VANETs. To evaluate the performance of given protocols, different set of scenarios with
varying nodes density have been simulated with the help of simulators NS-2, SUMO and MOVE.
This document summarizes a research paper that proposes a distributed protocol for assigning time slots in a wireless sensor network. The protocol has two phases: 1) Nodes fairly reserve multiple slots in a fixed frame to transmit data, so each node gets a fair share. 2) A centralized greedy algorithm is applied to reduce the frame length while ensuring each node gets at least one slot, making the frame as short as possible. Simulation results showed the protocol improves fairness of slot distribution and reduces frame length compared to an earlier algorithm.
The document proposes a new VLSI architecture for DSSS signal acquisition that uses Galois sequences. It summarizes that the proposed architecture provides improved signal acquisition at low SNR compared to existing architectures. The key blocks are a Galois sequence generator and QPSK modulation/demodulation. Simulation results on MATLAB and FPGA show the architecture requires low power and complexity while achieving comparatively better low SNR signal acquisition.
Performance analysis of papr reduction techniques in multicarrier modulation ...eSAT Journals
Abstract Orthogonal FrequencyDivisionMultiplexing (OFDM) is one of the many multicarrier modulation techniques which provide high spectral efficiency, less vulnerability to echoes,low implementation complexity and resilience to non – linear distortion. It is used in communication systems due to its various advantages. However, while this system is implemented problem of high peak – to – average power ratio(PAPR) is encountered. The reason behind this drawback is the existence of manyindependent subcarriers, due towhichthesignal amplitudecanhavehighpeakvalues as compared to average of whole system. The high PAPR in multicarrier transmission systems causes power degradation and spectrum spreading.Interleaving, Tone Reservation, Peak Reduction Carrier,Block Coding, Active Constellation Extension, Envelope ScalingareamongmanyPAPRreductionschemesthathavebeenproposedas a remedy to thisproblem. In this paper, performances of Amplitude Clipping and Filtering, Selected Level Mapping (SLM), and PartialTransmitSequence (PTS) techniques of PAPR reduction in OFDM systems by parameter variations are analyzed, based on Complementary Cumulative Distribution Function. An attempt has been made to simulate clipping and filtering technique with iterations and the simulation shows that PAPR problem is reduced as number of iterations increases. The attempts have also been made to simulate SLM technique and PTS technique by varying number of phase sequences, number of sub-blocks in SLM, PTS respectively and simulation results shows that by increasing the number of phase sequences, sub-blocks, PAPR can be reduced significantly.The mathematical equations are incorporated here to compute the maximum expected PAPR from an OFDM signal which shows when there is phase alignment of all sub carriers and sub carriers are equally modulated, then signal peak value hits the maximum. Besides these computer simulations, a comparative study of these three techniques is done.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes a study on the performance of turbo coded orthogonal frequency division multiplexing (OFDM) over fading channels. It describes how OFDM can mitigate inter-symbol interference caused by frequency selective fading channels by dividing the channel into parallel subchannels. It then provides details on turbo coding, including the encoder and iterative decoder design. The system model studied transmits a turbo coded OFDM signal over a frequency selective Rayleigh fading channel and evaluates the performance for rate 1/3 and 1/2 turbo codes. Simulation results are presented to analyze the bit error rate.
This document summarizes a research paper that evaluates the performance of the Dynamic Source Routing (DSR) routing protocol for Variable Bit Rate (VBR) multimedia traffic in mobile ad hoc networks (MANETs) using the Network Simulator 2 (NS-2). The paper conducts simulations of DSR under different scenarios by varying the terrain size, connection rate, and data send rate. It compares the performance of DSR and an enhanced version of DSR based on packet delivery ratio, average end-to-end delay, and optimal path length. The results show that the enhanced DSR performs better in terms of packet delivery but worse in terms of delay and path length compared to the original DSR protocol.
This document summarizes a research paper that proposes a method for identifying reliable nodes in an ad hoc wireless network to form stable routing paths. The method evaluates nodes based on their transmission range, signal strength, packet forwarding capacity, and position. Nodes meeting certain thresholds for these metrics are identified as reliable and added to a neighbor routing table. Simulation results showed this selective approach to identifying reliable nodes performed better than the traditional AODV routing protocol at maintaining stable routes in the face of node mobility.
Artificial Intelligence Based Mutual Authentication Technique with Four Entit...IDES Editor
4-G mobile communications system has utilized
high speed data communications technology having
connectivity to all sorts of networks including 2-G and 3-G
mobile networks. Authentication of mobile subscribers and
networks are a prime criterion to check and minimize security
threats and attacks. An artificial intelligence based mutual
authentication system with four entities is proposed. A person
talking salutation or greeting words in different times are
always consisting of a very narrow range of frequencies which
are varying in nature from person to person. Voice frequency
of the salutation or selective words used by a subscriber like
Hello, Good Morning etc is taken as first entity. Second entity
is chosen as frequency of flipping or clapping sound of the
calling subscriber. Then third entity is taken as face image of
the calling subscriber. Fourth entity is granted as probability
of salutation or greeting word from subscriber’s talking habit
(set of salutation words) while initializing a call. These four
entities such as probability of particular range of frequencies
for the salutation word, frequency of flipping sound, face
image matching of the subscriber, particular salutation or
greeting word at the time of starting a call are used with most
frequently, more frequently and less frequently by the calling
subscriber like uncertainty in Artificial Intelligence (AI). Now
different relative grades are assigned for most frequently,
more frequently and less frequently used parameters and the
grades are modified according to the assumed weightage. A
Fuzzy Rule (condition) by Fuzzy operation is invented. If the
results obtained from fuzzy operations are satisfied by the
fuzzy rule, the subscriber (MS) and the network (Switch or
Server) are mutually authenticated in 4-G mobile
communications.
This document proposes a physical-layer network coding (PNC) scheme to improve capacity in wireless networks. PNC takes advantage of the broadcast nature of wireless transmissions by allowing signals from multiple nodes to be combined at the receiver using network coding principles. Specifically:
- PNC coordinates transmissions so that signals from different nodes arrive simultaneously at the relay node, where they are combined using modulation mapping that performs network coding operations in the physical layer.
- This allows the relay node to transmit a single coded signal, requiring fewer time slots than schemes that avoid or separate interfering signals.
- In a basic three-node example network, PNC allows information exchange between the two outer nodes in two time slots, compared
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
Performance Analysis and Development of an Efficient Routing Scheme for IEEE ...IDES Editor
A collision-free centralized scheduling algorithm
for IEEE 802.16 WiMAX provides a mechanism for
creations multi-hop mesh and high-quality wireless
multimedia services which can be developed as a high speed
broad band wireless network. In centralized scheduling for
IEEE 802.16 mesh networks, all packets should be
transported through the BS (Base station).The links to or
from the BS becomes the system’s bottleneck and the
throughput is heavily impacted by the interference. To solve
this problem, we evaluated the proposed algorithm with five
selection criteria of scheduling through extensive simulations
and the experimental results are instrumental for improving
the performance of IEEE 802.16 based WMNs in terms of link
scheduling. We compared the effect of two routing and one
scheduling algorithm on the scheduling length. The result
shows that best algorithm has improved the system
performance in the aspects of scheduling length, transmission
range, and channel utilization ratio.
This document proposes a new two-level frequency hopping code division multiple access (FH-CDMA) scheme for wireless communication systems. The scheme partitions modulation codes and frequency hopping (FH) patterns, providing more flexibility than previous schemes. It divides the available bandwidth into multiple frequency bands. Data is encoded into symbols using modulation codes, then each symbol is represented by a unique FH pattern to determine the carrier frequency across bands over time. This two-level encoding allows supporting more users without increasing the number of FH patterns. Performance and spectral efficiency of the new scheme are analyzed and shown to achieve higher data rates and better efficiency than previous schemes under some conditions.
Mobility and Propagation Models in Multi-hop Cognitive Radio Networksszhb
This document discusses how mobility affects the performance of multi-hop cognitive radio networks under different propagation models. It summarizes the results of simulations run with the Network Simulator 2 (NS2) that tested free space, two-ray ground, and shadowing propagation models carrying MPEG4 video traffic over a cognitive radio network with mobile nodes. The key findings are: 1) Free space propagation provided the best throughput and lowest loss ratio compared to two-ray ground and shadowing models; 2) All propagation models performed significantly worse with mobile nodes compared to stationary nodes; 3) Mobility reduced average performance by disrupting signal strength and increasing noise as nodes moved.
The four basic Radio Resource Management (RRM) measurements in Long Term Evolution (LTE) system
are Channel Quality Indicator (CQI), Reference Signal Received Power (RSRP), Reference Signal
Received Quality (RSRQ), and Carrier Received Signal Strength Indicator (RSSI). A measurement of channel quality represented by Signal to Interference plus Noise Ratio (SINR) is used for link adaptation along with packet scheduling, whereas RSRP and RSRQ are needed for making handover decision during intra-eUTRAN (evolved Universal Terrestrial Random Access Network) handover in LTE. In this paper,
some practical measurement results recorded from a live LTE network of Australia using a commercial measurement tool namely NEMO Handy are analysed to verify the possible relationships among SINR, RSRP, RSSI and RSRQ as well as to evaluate the effects of SNR on throughput. In addition, the intraeUTRAN handover events occurred during the test period within the test area are studied. The analysis
yields some useful information such as: if the SINR is good for a measurement slot, higher throughput is
achieved; RSRP and SNR are proportional to each other on average; and lesser is the difference between
RSSI and RSRP, better is the RSRQ – each of which is consistent with theory. All the measurement results
are evaluated using computer programs built on MATLAB platform.
Iaetsd game theory and auctions for cooperation inIaetsd Iaetsd
This document summarizes game theory and auction approaches for encouraging cooperation in wireless networks. It first discusses how cooperative communication can improve wireless capacity by exploiting antennas across devices. However, applying cooperation is challenging because nodes lack incentives to help. The document surveys existing game theoretic solutions for providing cooperation incentives. It outlines classification of games, concepts like Nash equilibrium, and how game theory has been applied in contexts like the relay dilemma game and Stackelberg game to model node interactions and identify stable cooperation strategies.
This document proposes a new zone-based bandwidth allocation protocol for wireless networks. The key points are:
1. It divides the network into zones based on hop count from the initial relay station, and allocates bandwidth to each zone to improve quality of service.
2. Within each zone, the bandwidth allocated is distributed to mobile users based on their visiting probability and required bandwidth. This aims to maximize the average user satisfaction rate.
3. The protocol is evaluated through simulations using the Network Simulator 2 (NS2) tool. Results show the protocol improves bandwidth allocation efficiency and reduces quality of service degradation compared to other approaches.
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
This document analyzes MAC protocols for cognitive radio wireless sensor networks (CR-WSNs). It begins with an introduction to cognitive radio and how combining it with wireless sensor networks can yield new networking capabilities. It then discusses various MAC protocol layers and focuses on the COGMAC protocol. COGMAC is a decentralized cognitive MAC protocol based on the multichannel preamble reservation scheme. The document outlines COGMAC's advantages over conventional MAC protocols and introduces an upgraded version called COGMAC+. COGMAC+ uses adaptive energy detection and random backoff schemes to improve performance. Finally, the document summarizes that cognitive radio can improve spectrum utilization and quality in sensor networks by exploiting multiple channel availability and overcoming issues from dense deployments.
Enhancement and performance evaluation of a multicast routing mechanism in zi...Raja' Masa'deh
this presentation presents description of a paper "Enhancement and Performance Evaluation of a Multicast Routing Mechanism in ZigBee Cluster-tree Wireless Sensor Network".
This document analyzes and compares OFDMA and CDMA/WCDMA systems. It first discusses channel estimation techniques for OFDMA and CDMA, including minimum mean square error (MMSE) and least squares estimation. It then analyzes properties of OFDMA systems, including the effect of total power and cluster size on signal-to-interference plus noise ratio and signal-to-interference ratio. Finally, it compares the downlink capacities of OFDMA and WCDMA systems and proposes a new multiple access technique called OWCFDMA that combines advantages of both. The overall goal is to improve wireless communication system performance by integrating OFDMA and CDMA/WCDMA techniques.
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksTELKOMNIKA JOURNAL
1) The document compares the secrecy probability performance of amplify-and-forward non-orthogonal multiple access (AF-NOMA) networks and amplify-and-forward orthogonal multiple access (AF-OMA) networks in the presence of an eavesdropper.
2) It derives an upper bound expression for the strictly positive secrecy capacity (SPSC) of the AF-NOMA network, which represents the probability that the instantaneous secrecy rates are positive.
3) The analysis shows that the SPSC of NOMA is significantly lower than OMA due to the channel characterization of NOMA, but it can be improved by optimizing the power allocation coefficients.
Study on outage performance gap of two destinations on CR-NOMA networkTELKOMNIKA JOURNAL
This document studies the outage performance of two secondary destinations in a cognitive radio non-orthogonal multiple access (CR-NOMA) network. It presents a system model of a downlink dual-hop CR-NOMA network consisting of a primary destination, secondary source, relay, and two secondary destinations. It derives the exact outage probability expressions for the secondary users by obtaining the signal-to-interference-plus noise ratio and signal-to-noise ratio for each transmission. The results show that the performance gap between the two secondary users can be obtained due to different power allocation factors assigned to each user.
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMATELKOMNIKA JOURNAL
In this paper, new radio access scheme that combines Amplify-and-Forward (AF) relaying protocol and non-orthogonal multiple access (NOMA) system is introduced. In particular, different scenarios for fixed power allocation scheme is investigated. In addition, the outage probability of both weak and strong user is derived and provided in closed-form expressions. Such outage is investigated in high SNR scenario and comparison performance between these NOMA scenarios is introduced. Numerical simulations are offered to clarify the outage performance of the considered scheme if varying several parameters in the existing schemes to verify the derived formulas.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...TELKOMNIKA JOURNAL
In the future wireless systems, non-orthogonal multiple-access (NOMA) with partial relay selection scheme is considered as developing research topic. In this paper, dual-hop relaying systems is deployed for NOMA, in which the signals are communicated with the assistance of decode-and-forward (DF) scheme. This paper presents exact expressions for outage probability over independent Rayleigh fading channels, and two partial relay selection schemes are provided. Using analytical result and Monte-Carlo method, we introduce forwarding strategy selection for fixed user allocation and exactness of derived formula is checked. The presented simulations confirm the the advantage of such proposed NOMA, and the effectiveness of the proposed forwarding strategy.
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...journalBEEI
Non-orthogonal multiple access (NOMA) with advantages such as superior spectral efficiency has been considered as a promising multiple access technique for the fifth-generation (5G) mobile networks. In this research, we propose energy harvesting (EH) NOMA system relaying network over Rayleigh fading channel using selection combining at the receiver. Firstly, we investigate the system performance in terms of the closed-form expression of the outage probability (OP). Here we compare the OP of two destination users of the proposed system. Finally, all the results is convinced by the Monte Carlo simulation. From the results, we can confirm that all the analytical and simulation results are the same in connection with the primary system parameters.
Enabling relay selection in non-orthogonal multiple access networks: direct a...TELKOMNIKA JOURNAL
In this paper, we consider downlink non-orthogonal multiple access (NOMA) in which the relay selection (RS) scheme is enabled for cooperative networks. In particular, we investigate impact of the number of relays on system performance in term of outage probability. The main factors affecting on cooperative NOMA performance are fixed power allocations coefficients and the number of relay. This paper also indicate performance gap of the outage probabilities among two users the context of NOMA. To exhibit the exactness of derived formula, we match related results between simulation and analytical methods. Numerical results confirms that cooperative NOMA networks benefit from increasing the number of relay.
Performance enhancement of wireless sensor network by using non-orthogonal mu...nooriasukmaningtyas
In this paper, we investigate a relaying wireless sensor network (WSN) with
the non-orthogonal multiple access (NOMA) and sensor node selection
schemes over rayleigh fading. Precisely, the system consists of two sensor
clusters, a sink node, and an amplify-and-forward (AF) relay. These sensors
applying the NOMA and sensor node selection schemes transmit the sensing
data from the sensor clusters via the relay to the sink. We derived the
expressions of outage probability and throughput for two sensor nodes. We
also provide numerical results to examine the behavior of the system. Finally,
we verify the validity of our analysis by using the monte-carlo simulation.
Secure outage probability of cognitive radio network relying non-orthogonal m...journalBEEI
This paper studies the secondary network relying relay selection to transmit signal from the secondary source (base station) to two destinations. Especially, two destinations are required non-orthogonal multiple access (NOMA) scheme and it benefits to implementation of the Internet of Things (IoT) systems. However, eavesdropper over-hears signal related link from selected relay to destination. This paper measure secure performance via metric, namely secure outage probability (SOP). In particular, signal to noise ratio (SNR) criterion is used to evalute SOP to provide reliable transmission to the terminal node. Main results indicates that the considered scheme provides performance gap among two signals at destination. The exactness of derived expressions is confirmed via numerical simulation.
Tractable computation in outage performance analysis of relay selection NOMATELKOMNIKA JOURNAL
In recent years, using full-duplex (FD) transmission model provides enhanced bandwidth efficiency and improved performance for non-orthogonal multiple access (NOMA) system. However, lack of papers have investigated FD relay together with relay selection issue to improve performance of NOMA system. The problems in power allocation for two NOMA users satisfying fairness as well as relay selection strategy are studied in this paper. By considering the outage performance of proposed scheme with its vital result, general NOMA wireless networks can be developed for future networks due to its improved performance. Simulation results show that the relaying selection scheme can achieve a significant performance improvement by increasing required quantity of relay.
Studying strictly positive secure capacity in cognitive radio-based non-ortho...journalBEEI
This paper studies a downlink security-aware secure outage performance in the secondary network of cognitive radio-assisted non-orthogonal multiple access network (CR-NOMA). The multiple relay is employed to assist transmission from the secondary source to destinations. The security-aware performance is subject to constraints in fixed power allocation factor assigned to each secondary user. The security-aware secure performance is based on channel state information (CSI) at the physical layer in which an eavesdropper intends to steal information. According to the considered system, exact expressions of Strictly positive secure capacity (SPSC) are proved to analyze system in terms of secure performance. Finally, the secondary user secure problem is evaluated via Monte-Carlo simulation method. The main results indicate that the secure performance of proposed system can be improved significantly.
Physical layer security in DF full-duplex relaying network: performance analysisnooriasukmaningtyas
In this letter, the system performance of the DF full-duplex (FD) relaying
communication network is investigated with physical layer security (PLS). In
this system model, the source (S) and the destination (D) communicate via a
helping relay (R) in the presence of the eavesdropper (E). From the system
model, we derive the closed-form expressions for intercept probability (IP)
and secrecy outage probability (SOP). For verifying the correctness of the
analytical analysis, the Monte Carlo simulation is conducted. In addition, the
influence of the main system parameter on the system performance is
investigated. Finally, the results show that the analytical and the simulation
values agree well with each other.
Outage and throughput performance of cognitive radio based power domain based...TELKOMNIKA JOURNAL
This paper considers power domain based multiple access (PDMA) in cognitive radio network to serve numerous users who intend to multiple access to core network. In particular, we investigate the effect of signal combination scheme equipped at PDMA end-users as existence of direct link and relay link. This system model using relay scheme provides performance improvement on the outage probability of two PDMA end-users. We first propose a simple scheme of fixed power allocation to PDMA users who exhibit performance gap and fairness. Inspired by PDMA strategy, we then find signal to noise ratio (SNR) to detect separated signal for each user. In addition, the exact expressions of outage probability are derived in assumption that receiver can cancel out the interference completely with successive interference cancellation (SIC). By exploiting theoretical and simulation results, both considered combination schemes (Maximal Ratio Combining (MRC) and Selection Combining (SC) can achieve improved performance of two PDMA users significantly.
Performance of cluster-based cognitive multihop networks under joint impact o...TELKOMNIKA JOURNAL
In this paper, we evaluate outage probability (OP) of a cluster-based multi-hop protocol operating
on an underlay cognitive radio (CR) mode. The primary network consists of multiple independent
transmit/receive pairs, and the primary transmitters seriously cause co-channel interference (CCI) to the
secondary receivers. To improve the outage performance for the secondary network under the joint impact
of the CCI and hardware imperfection, we employ the best relay selection at each hop. Moreover, the
destination is equipped with multiple antennas and uses the selection combining (SC) technique to
enhance the reliability of the data transmission at the last hop. For performance evaluation, we first derive
an exact formula of OP for the primary network which is used to calculate the transmit power of the
secondary transmitters. Next, an exact closed-form expression of the end-to-end OP for the secondary
network is derived over Rayleigh fading channels. We then perform Monte-Carlo simulations to validate
the derivations. The results present that the CCI caused by the primary operations significantly impacts on
the outage performance of the secondary network.
Adaptive relaying protocol for wireless energy harvesting and information pro...journalBEEI
In order to satisfy the increasing data rate demands, the research in the fifth-generation (5G) wireless networks is ongoing, both in academia and industry. In this research, we propose and investigate adaptive relaying protocol (ARP) For wireless energy harvesting (EH) and information processing in NOMA systems. Firstly, we investigate and derive the closed-form and integral-form expressions of the outage probability (OP) of the model system. Then, all the results are convinced by the Monte Carlo simulation. The research results show that all the analytical and simulation results are the same in connection with the primary system parameters. This research can provide a recommendation for NOMA system network.
In this paper, we design a secure transmission scheme in uplink and downlink of nonorthogonal
multiple access (NOMA) system. In this scenario, two pairs of base stationuser can operate under the presence of eavesdropper. The relay plays an important role to forward signals from group of base stations to serve distant users. However, the eavesdropper can overhear signal which leads to secure performance need be reconsidered. To provide secure performance, we derive the closed-form expressions for strictly positive secrecy capacity (SPSC). In addition, we rely on relay for enlarge coverage area. The channel conditions meet imperfect channel state information (CSI) which shows degraded secure performance. Results confirm the relationship between transmit power at the source and and SPSC how many main parameters affecting secure
performance metric. Furthermore, simulation results show that the uplink and downlink NOMA technique improves secure performance in the low SPSC region. We further conduct analysis by using Monte-Carlo simulations.
Physical security layer with friendly jammer in half-duplex relaying networks...journalBEEI
In this research, thephysical security layer with a friendly jammerin half-duplex (HD) relaying networksover the Rayleigh fading channel is proposed and investigated. Firstly, we proposed the system model and the time switching,power splitting protocolsfor the system model. Then we conductedthe mathematical analysisfor deriving the exact analysis and asymptotic analysisintegral forms for intercept probability (IP). Finally, the analytical formulationis verified by the Monte Carlo simulation with all main system parameters. From the results, we can show that the simulation and analytical values are the same values.
Performance analysis for power-splitting energy harvesting based two-way full...TELKOMNIKA JOURNAL
Energy harvesting relay network is considered as the promising solution for a wireless
communication network in our time. In this research, we present and demonstrate the system performance
of the energy harvesting based two-way full-duplex relaying network over Nakagami-m fading
environment. Firstly, we propose the analytical expressions of the achievable throughput and outage
probability of the proposed system. In the second step, the effect of various system parameters on
the system performance is presented and investigated. In the final step, the analytical results are also
demonstrated by Monte-Carlo simulation. The numerical results demonstrated and convinced
the analytical and the simulation results are agreed with each other.
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...TELKOMNIKA JOURNAL
In this study, we deploy design and performance analysis in new system model using a relaying
model, energy harvesting, and non-orthogonal multi-access (NOMA) network. It is called such topology as
wireless powered NOMA relaying (WPNR). In the proposed model, NOMA will be investigated in two
cases including single successive interference cancellation (SIC) and dual SIC. Moreover,
the simultaneous wireless information and power transfer (SWIPT) technology can be employed to feed
energy to relays who intend to serve far NOMA users. In particular, exact outage probability expressions
are provided to performance evaluation. The results from the simulations are used to demonstrate
the outage performance of the proposed model in comparison with the current models and to verify correct
of derived expressions.
Implement of multiple access technique by wireless power transfer and relayin...journalBEEI
In this paper, we investigate non-orthogonal multiple access (NOMA) network relying on wireless power transfer to prolong lifetime. The base station (BS) sends common signals to the relay with two functions (energy harvesting (EH) and signal processing) to further serve two NOMA users in downlink. Performance gap exists since different power allocation factor assigned from power splitting protocol adopted at the relay and such relay employs both amplify-and-forward (AF) and decode-and-forward schemes. To provide performance metrics, we prove formulas of the outage probability which is a function of transmit signal to noise ratio. Simulation results indicate specific parameters to adjust system performance of two user in the considered EH-NOMA system. This finding is important recommendation to design EH-NOMA which shows particular outage performance at required target rates.
Similar to Security performance analysis for power domain NOMA employing in cognitive radio networks (20)
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
The document proposes using a particle swarm optimization (PSO) algorithm to optimize the hyperparameters of a convolutional neural network (CNN) for image classification. The PSO algorithm is used to find optimal values for CNN hyperparameters like the number and size of convolutional filters. In experiments on the MNIST handwritten digit dataset, the optimized CNN achieved a testing error rate of 0.87%, which is competitive with state-of-the-art models. The proposed approach finds optimized CNN architectures automatically without requiring manual design or encoding strategies during training.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
This document describes the implementation of a double-layer structure on an octagon microstrip yagi antenna (OMYA) to improve its performance at 5.8 GHz. The double-layer consists of two double positive (DPS) substrates placed above the OMYA. Simulation and experimental results show that the double-layer configuration increases the gain of the OMYA by 2.5 dB compared to without the double-layer. The measured bandwidth of the OMYA with double-layer is 14.6%, indicating the double-layer can increase both the gain and bandwidth of the OMYA.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
The document provides an overview of the key performance indicators (KPIs) for 6G wireless networks compared to 5G networks. Some of the major KPIs discussed for 6G include: achieving data rates of up to 1 Tbps and individual user data rates up to 100 Gbps; reducing latency below 10 milliseconds; supporting up to 10 million connected devices per square kilometer; improving spectral efficiency by up to 100 times through technologies like terahertz communications and smart surfaces; and achieving an energy efficiency of 1 pico-joule per bit transmitted through techniques like wireless power transmission and energy harvesting. The document outlines how 6G aims to integrate terrestrial, aerial and maritime communications into a single network to provide ubiquitous connectivity with higher
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
A multi-task learning based hybrid prediction algorithm for privacy preservin...journalBEEI
There is ever increasing need to use computer vision devices to capture videos as part of many real-world applications. However, invading privacy of people is the cause of concern. There is need for protecting privacy of people while videos are used purposefully based on objective functions. One such use case is human activity recognition without disclosing human identity. In this paper, we proposed a multi-task learning based hybrid prediction algorithm (MTL-HPA) towards realising privacy preserving human activity recognition framework (PPHARF). It serves the purpose by recognizing human activities from videos while preserving identity of humans present in the multimedia object. Face of any person in the video is anonymized to preserve privacy while the actions of the person are exposed to get them extracted. Without losing utility of human activity recognition, anonymization is achieved. Humans and face detection methods file to reveal identity of the persons in video. We experimentally confirm with joint-annotated human motion data base (JHMDB) and daily action localization in YouTube (DALY) datasets that the framework recognises human activities and ensures non-disclosure of privacy information. Our approach is better than many traditional anonymization techniques such as noise adding, blurring, and masking.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Security performance analysis for power domain NOMA employing in cognitive radio networks
1. Bulletin of Electrical Engineering and Informatics
Vol. 9, No. 3, June 2020, pp. 1046~1054
ISSN: 2302-9285, DOI: 10.11591/eei.v9i3.1639 1046
Journal homepage: http://beei.org
Security performance analysis for power domain NOMA
employing in cognitive radio networks
Thi-Anh Hoang, Chi-Bao Le, Dinh-Thuan Do
Industrial University of Ho Chi Minh City, Vietnam
Article Info ABSTRACT
Article history:
Received May 16, 2019
Revised Sep 26, 2019
Accepted Feb 1, 2020
The power domain non-orthogonal multiple access (NOMA) technique
introduces one of the fundamental characteristics and it exhibits
the possibility of users to decode the messages of the other paired users on
the same resources. In cognitive radio inspired NOMA (CR-NOMA),
the base station (BS) has to serve untrusted users or users with different
security clearance. This phenomenon raises a security threat particularly in
such CR-NOMA. This paper develops a tractable analysis framework to
evaluate the security performance of cooperative non-orthogonal multiple
access (NOMA) in cognitive networks, where relay is able to serve two far
NOMA users in the presence of external eavesdropper. In particular,
we study the secrecy outage probability in a two-user NOMA system.
This situation happens in practical the BS is pairing a legitimate user with
another untrusted user. Main reason is that the non-uniform distribution in
terms of trusted and untrusted users in the cell. By performing numerical
results demonstrate the performance improvements of the proposed NOMA
scheme in comparison to that of several situations in terms of different
parameters. Furthermore, the security performance of NOMA is shown to
verify thederived expressions.
Keywords:
Cognitive radio
Non-orthogonal multiple access
(NOMA)
Physical-layer security
This is an open access article under the CC BY-SA license.
Corresponding Author:
Dinh-Thuan Do,
Industrial University of Ho Chi Minh City,
12 Nguyen Van Bao, Go Vap, Ho Chi Minh City, Vietnam.
Email: dodinhthuan@iuh.edu.vn
1. INTRODUCTION
As a promising multiple access (MA) technique, Non-orthogonal multiple access (NOMA) has been
proposed to adapt the challenging requirements of the future mobile communication networks. Several strict
requirements in 5G wireless communication can be achieved such as high data speed, spectral efficiency,
massive connectivity and low latency [1-10]. In [11, 12] the NOMA can be integrated with green
communication to enable ability of wireless power transfer in cooperative NOMA network. Other application
of device-to-device (D2D) to NOMA is introduced as in [13]. Different with the conventional MA
techniques, the power domain is used to serve a multiple user in NOMA at different power levels and such
paradigm exhibits a high spectral efficiency [14]. To permit the unlicensed users operating on the spectrum
allocated for the licensed users, cognitive radio networks (CRNs) have been recommended to achieve full
advantage of radio resource. In these situations, the quality of service of the primary user networks
is maintained [15, 16]. In general, power domain multiple access scheme and spectrum efficiency
are advantages are able to achieved. Hence, by introducing NOMA to PUNs, the system performance
of cognitive radio can be further increased.
2. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Security performance analysis for power domain NOMA employing in... (Thi-Anh Hoang)
1047
In the other trend, dedicated relays [17-19] are also deployed to reform cooperative NOMA
transmission [20]. To enhance the reliability of the NOMA-weak users, [21] adopted a dedicated
relay network. Also, with the help of a relay (both AF and DF protocols) [22] presented a secrecy analysis
of a NOMA system. The other works reported in [23-25], in which the CR networks are studied with
an underlay paradigm. From raised analytical results according to the previous analysis, the improved system
performance benefits from combining system between overlay CR and NOMA. Unfortunately, overlay
CR can enhance system performance and also produce the risk of infection of illegal information
simultaneously. On the contrary, NOMA can achieve better secrecy performance than OMA [22].
The physical layer security performance in overlay CR-NOMA networks is still a challenging issue and it
motivates this study. This paper determines physical layer security (PLS) in cognitive radio inspired
non-orthogonal multiple access (CRNOMA) networks with secondary source and multiple secondary users
under impact of primary destination.
To manage the interference among the users and guarantee the quality of services (QoS) of primary
users, a new secure NOMA transmission strategy is designed, where the primary and secondary users
are paired according to their channel gains, respectively, and power-domain NOMA is employed to transmit
the signal. This paper studies a downlink cooperative CR-NOMA model with interference temperature
constraint (ITC) at the primary receiver. Exact closed-form expressions for the OP of the far NOMA users
are derived. These expressions are verified by Monte-Carlo simulations.
2. SYSTEM MODEL
A downlink cooperative underlay CR-NOMA is considered in this study. In this model, secondary
network (SN) consists of a secondary base station (S), a relay (R) and two far NOMA users (D1; D2) can
operate together with primary network containing primary destination (PD) who make impact on system
performance at secondary network, as shown in Figure 1. Regarding secure performance, existence
of eavesdropper E need be concerned. The links are assigned channel as in Figure 1 and these channels
follow flat Rayleigh fading model. SR
h is the channel between BS and relay, SR
h is the channel between Relay
and two users. S
P is transmit power at the BS. We denote the superimposed signal to transmit from the BS
to secondary destinations 1 1 2 2
S S
a P x a P x
. While 1 2
,
a a are power allocation factors in NOMA satisfying
1 2 1 2
1,
a a a a
.
BS Relay
PD
D1
D2
E
hRD1
hRD2
hRE
hSR
hSP
Figure 1. Systemmodel of secure CR-NOMA
The transmit power constraint is determined at the BS:
_
2
min ,
S S
SP
I
P P
h
(1)
3. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 3, June 2020 : 1046 – 1054
1048
where
_
S
P and I stand for maximum average transmit power available at the BS and ITC at D
P . In the first
time, R received the following signal:
1 1 2 2
R SR S S R
y h a P x a P x n
(2)
in which R
n stand for the AWGN noise terms at R.
Then, we compute signal-to-interference-plus-noise ratio (SINR) and signal-to-noise ratio (SNR)
of decoding 1
x and 2
x at R and they can be respectively written as:
2
1
1
2
2 1
S SR
R
S SR
a h
a h
(3)
and
2
2
2
R S SR
a h
(4)
where 2
S
S
P
is the transmit SNR at the BS.
In the second phase, the detected superimposed signal 1 1 2 2
R R
P x P x
will be forwarded to
destinations.It is noted that R
P is the transmit power at R . The received signal at i
D can be given as:
1 1 2 2 , 1,2
Di RDi R R Di
y h P x P x n i
(5)
where Di
n is the AWGN noise terms at i
D . Further, due to the fact that 1
D is allocated with higher power
factor, it can detect 1
x by treating 2
x as a background noise and it can be achieved following SINR.
2
1 1
1 2
1 2 1
RD R
D
RD R
h
h
(6)
Furthermore, 2
D with SIC is required to detect 1
x while 2
x is considered as a noise. The SINR in
this case can be expressed:
2
2 1
2 1 2
2 2 1
RD R
D
RD R
h
h
(7)
where 2
R
R
P
is the transmit SNR at R . the following SNR can be obtained to 2
D detects its own signal.
2
2 2 2
D RD R
h
(8)
The signal received at E
1 1 2 1
E RE E E E
y h P x P x n
(9)
where E
n indicates the AWGN noise terms at E . RE
h is the channel between Relay and E .
The signal-to-noise ratio (SNR) at E :
2
Ei i E RE
h
(10)
4. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Security performance analysis for power domain NOMA employing in... (Thi-Anh Hoang)
1049
where 2
E
E
P
is transmit SNR at E . The achievable rates of 1
x and 2
x are derived respectively:
1
1 2 2 1 1
1
log 1 min , ,
2 R D D
K
(11)
2
2 2 2
1
log 1 min ,
2 R D
K
(12)
and the achievable rates of eavesdropper’s signalis given by:
2
1
log 1
2
Ei Ei
K
(13)
the secrecy capacity for 1
D is obtained as:
1
2 1 1
1 2
1
1 min , ,
1
log
2 1
R D D
E
C
(14)
the secrecy capacity for 2
D is obtained as:
2
2
2 2
2
1 min ,
1
log
2 1
R D
E
C
(15)
where
max ,0
x x
.
3. SECRECY PERFORMANCE ANALYSIS
In NOMA systems, with the help of a relay two signals are transmitted from the source to 1
D
and 2
D respectively. As a result, outage happens when either 1
C or 2
C falls below their own target rates.
Be exploiting this definition, the secure outage probability (SOP) can be formulated as following sections:
3.1. SOP at D1
1 1 1
2 2
2 2
1 2 1
1 1
2 2
2 2 2
2
2
1 1
1
2
1 2
Pr
1 Pr Pr
1 1
Pr
1
SOP
S SR RD R
RE RE
S SR RD R
A B
RD R
RE
RD R
C
P C R
a h h
h h
a h h
h
h
h
(16)
where 1 1
2 2
1 1
2 , 2 1
R R
E
.
Firstly, A can be written by:
1 2
2 2 2
1 1
2 2
2 2
2 2
1 1 2 1 1 2
Pr , Pr ,
RE RE SP
I I
SR S SR S
SP SP
S RE S RE I
A A
h h h
A h h
h h
a h a a h a
we have 1
A as:
5. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 3, June 2020 : 1046 – 1054
1050
2
2 2
1
1 2
1 1 2
Pr ,
RE I
SR SP
S
S RE S
h
A h h
a h a
provided that
2 1 2 1
2
RE
a a
h
a
, then 1
A can be calculated as:
1 2 1
2
2 2 2
1
1 1 2
1
1 1 2
1 1 2 2
2
1 0 0
0
1
1
I
S
RE
SP SR
S S
I
S SR
S SP RE
a a
a
y
h
h h
a y a
y
y
a a
a a a y
a
RE
A f x f y f z dxdydz
e e e dy
where 1 1 2 2
,
u a a v a
, we have:
1
1 0
1
1
I
S SR
S SP RE
y
y
u
u vy
v
RE
A e e e dy
let
u q dq
u vy q y dy
v v
. We have:
1 1
1
I RE S SR
S SP
u
v v
RE
e
A e
v
(17)
where
1
1 0
RE S SR
u v
q
u v vq
e dq
.
Similar 1
A , we can calculated 2
A as:
2 2
1 I I
S SP RE I S SR
u
v v
RE
A e
v
(18)
where
1
2 0
1
I
RE I S SR
u v
q
u v vq
I SR
I SR SP
qv
e dq
qv u q v
.
From (17) and (18) we find A by:
1 2
1
1
I I I
RE S SR
S SP S SP RE I S SR
u
u
v v
v v
RE RE
e
A e e
v v
(19)
the secondly,B can be written as:
2
2 1
2 2
1 1 2 2
Pr RE
RD
RE R
h
B h
h
6. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Security performance analysis for power domain NOMA employing in... (Thi-Anh Hoang)
1051
provided that
2 1 1 2
2
RE
h
, B calculated as:
1
1 1 2 1 1 2
1 1 2 2 2
2 2
2 2
1
2
1 1 2 2
0 0
1 R RD
RE
RE RD
R
x
x
x
x
h h
x RE
B f x f y dxdy e e dx
where 1 1 2 2
,
n m
, we have:
1
2
0
1 R RD
RE
x
x
n
n mx
m
RE
B e e dx
let
n t dt
t n mx x dx
m m
. We have:
2
1
RE R RD
n
m m
RE
e
B
m
(20)
where
1
2
1 0
RE R RD
n m
t
n m mt
e e dt
.
Similar (20), we can calculated C as:
1
2
RE R RD
n
m m
RE
e
C
m
(21)
where
1
1
1 0
RE R RD
n m
t
n m mt
e dt
.
From (19), (20) and (21) we calculated 1
SOP
P as:
2 1
1 1 2
2 1
1
1 1
I I I
RE S SR
S SP S SP RE I S SR
RE R RD RE R RD
u
u
v v
v v
SOP
RE RE
n n
m m m m
RE RE
e
P e e
v v
e e
m m
(22)
3.2. SOP at D2
By definition, we have SOP as:
2 2
2 2 2 2
2 2 2 2 2
Pr
1 Pr Pr
SOP
S SR RE R RD RE
D E
P C R
a h h h h
(23)
where 2 2
2 2
2 2
2 , 2 1
R R
E
. Firstly, D can be rewritten as:
1
2
2
2 2 2 2 2
2
2 2 2
2
Pr , Pr ,
I SR
I I
S SR RE SP RE SP
S S
SP
D D
a h
D a h h h h h
h
7. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 3, June 2020 : 1046 – 1054
1052
let
2
1
S
a
a
, 1
D can be computed as:
2
1
2 2 2
1 2
Pr , 1 1
I
SP S SR
a
I RE
SR RE SP
S SR
a
D h a h a h e e
(24)
next, let
2
1
I
a
a
, 2
D can calculated as:
2
2 2 2 2 2
2 2
1
0 2
Pr ,
I
I I RE SR S
SP S SR S
I
SR SP RE SP SP
S
a
x
a
SR
RE SP SR SP
SP
D h a h h a h h
e
e dx
a a
x
a
Let 2 1
,
SR SP I
SP RE SR S
a a
a
, we have 2
D
2 2
2 1
0
I I I I
SP S SR S SP S SR S
a a
x
SR SR
RE SP RE SP
e
D e dx e e E
a x a
(25)
from (22) and (23) D can be as:
2 2
1
1
1 1
I I I
SP S SR SP S SR S
a a
SR
RE
SR RE SP
a
D e e e e E
a
(26)
next, with
2
1
R
b
E can be calculated as:
2
2
2 2
2
2
2
0
2
RD
RE RD
b
RD
h h
bx b
RE RD
E f x f y dxdy e
b
(27)
from (24) and (25) it can be calculated 2
SOP
P as:
2 2
2
2 2
2
1
2
2
2
2
1
2
1 1 1
I
SR RD SP S
I I
SP S SR S RD
a b
RD RE
SOP
SR
RE RD
a b
SR RD
RE SP RE RD
a
P e e
b
e e E
a b
(28)
4. NUMBER RESULTS
This section of this study represents numerical and simulation results for the SOP over related
Rayleigh fading channels. The adopted system parameters are given in each figure. We evaluate the impact
of target rates on the secrecy outage performance for NOMA-based cognitive radio as in Figure 2. Higher
target rates result in worse SOP performance. It can be seen performance gap among two signals is large at
1 2 0.5
R R
. The reason is that different power allocation factors for each signal leads to different SOP
8. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Security performance analysis for power domain NOMA employing in... (Thi-Anh Hoang)
1053
performance. In other observation, impact of interference 10,15, 20( )
I dB
to secure performance of two
signals can be seen as Figure 3. It can be confirmed lower interference provides better secure performance.
Such performance gap will be reduced at 1 2 1
R R
. The analytical values of the OP for 1 2
,
x x with various
target rates and SNR threshold values are shown in Figure 4. It is observed that curves of the OP improve
by increasing the transmit SNR. It is worth noting that no ICT case exhibits better secure performance.
Figure 2. 1 1 0.9
a
, 2 2 0.1
a
, 15
I dB
,
5
E dB
, 0.1
SP
, 1
SR
, 1 0.9
RD
, 2 0.6
RD
and 0.1
RE
Figure 3. SOP versus transmit SNR with different
I
( 1 1 0.9
a
, 2 2 0.1
a
,, 5
E dB
,
0.1
SP
, 1
SR
, 1 0.9
RD
, 2 0.6
RD
and 0.1
RE
)
Figure 4. SOP versus transmit SNR as ITC consideration ( 1 1 0.9
a
, 2 2 0.1
a
, 15
I dB
,
5
E dB
, 0.1
SP
, 1
SR
, 1 0.9
RD
, 2 0.6
RD
and 0.1
RE
)
5. CONCLUSION
In this paper, in order to evaluate security performance of CR-NOMA systems, SOP performance in
condition of fixed power allocation scheme is examined. A limitation of transmit power at the secondary in
CR-NOMA results in varying secure performance. The threshold data rates and impact of interference from
the primary network are main factors affecting to systemperformance.
9. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 3, June 2020 : 1046 – 1054
1054
REFERENCES
[1] Z. Ding, X. Lei, G. K. Karagiannidis, “A survey on non-orthogonal multiple access for 5G networks: Research
challenges and future trends IEEE,” J. Sel. Areas Commun, vol. 35, no. 10, pp. 2181-2195, 2017.
[2] Y. Liu, Z. Qin, M., “Elkashlan. Nonorthogonal multiple access for 5G and beyond,” Proceedings of the IEEE,
vol. 105, no. 12, pp. 2347-2381, 2017.
[3] Z. Zhang, H. Sun, and R. Q. Hu, “Downlink and uplink non-orthogonal multiple access in a dense wireless
network,” IEEE J. Sel. AreasCommun, vol. 35, no. 12, pp. 2771-2784, 2017.
[4] Tan N. Nguyen, Minh Tran, Van-Duc Phan, H.-N. Nguyen and T.-L. Nguyen,"Half-duplex power beacon-assisted
energy harvesting relaying networks: system performance analysis," International Journal of Electrical and
Computer Engineering, vol. 9, no. 5, pp. 3399-3406, Oct. 2019.
[5] Tan N. Nguyen, Van-Duc Phan, H.-N. Nguyen, Minh Tran and T.-T. Tran,"Performance Analysis for Power-
Splitting Energy Harvesting Based Two-Way Full-Duplex Relaying Network over Nakagami-m Fading Channel,"
Telecommunication, Computing, Electronics and Control TELKOMNIKA, vol. 17, no. 4, pp.1595-1603, Aug. 2019.
[6] Phu Tran Tin, Minh Tran, Tan N.Nguyen and Tran Thanh Trang,"Energy Harvesting Half-Duplex AF Power
Splitting Protocol Relay Network over Rician Channel in Case of Maximizing Capacity", Telecommunication,
Computing, Electronics and Control TELKOMNIKA, vol. 17, no. 4, pp. 1615-1624, Aug. 2019.
[7] Phu Tran Tin, Minh Tran, Tan N. Nguyen, Thanh-Long Nguyen,"System performance analysis of hybrid time-
power switching protocol of EH bidirectional relaying network in amplify-and-forward mode", Indonesian Journal
of Electrical Engineering and Computer Science, vol. 14, no. 1, pp. 118-126, Apr. 2019.
[8] Dinh-Thuan Do and M. S., Van Nguyen, "Device-to-device transmission modes in NOMA network with and
without Wireless Power Transfer," Computer Communications, vol. 139, pp. 67-77, May 2019.
[9] D.-T. Do and A.-T. Le, “NOMA based cognitive relaying: Transceiver hardware impairments, relay selection
policies and outage performance comparison,” Computer Communications, vol. 146, pp. 144-154, 2019.
[10] D.-T. Do, M. Vaezi and T.-L. Nguyen, “Wireless Powered Cooperative Relaying using NOMA with Imperfect
CSI,” in Proc. of IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, UAE, pp. 1-6, 2018.
[11] T.-L. Nguyen and Dinh-Thuan Do, "Exploiting Impacts of Intercell Interference on SWIPT-assisted Non-
orthogonal MultipleAccess," Wireless Communications and Mobile Computing, vol. 2018, pp. 1-12, 2018
[12] D.-T. Do, A.-T. Le, C.-B. Le and B. M. Lee “On Exact Outage and Throughput Performance of Cognitive Radio
based Non-Orthogonal Multiple Access Networks with and Without D2D Link,” Sensors (Basel), vol. 19, no. 15,
pp. 1-17, 2019.
[13] H. Zhang, B. Wang, C. Jiang, “Energy efficient dynamic resource optimization in NOMA sy stem,” IEEE Trans.
Wireless Commun, vol. 17, no. 9, pp. 5671-5683, 2018.
[14] Y. Deng, L. Wang, S. A. R. Zaidi, “Artificial-noise aided secure transmission in large scale spectrum sharing
networks,”IEEE Trans. Wireless Commun, vol. 64, no. 5, pp. 2116-2129, 2016.
[15] Y. Liu, Z. Ding, M. Elkashlan, “Non-orthogonal multiple access in large-scale underlay cognitive radio networks,”
IEEE Trans. Veh.Technol, vol. 65, no. 12, pp. 152-157, 2016.
[16] Phu Tran Tin, Le Anh Vu, Tan N. Nguyen, Thanh-Long Nguyen, "User selection protocol in DF cooperative
networks with hybrid TSR-PSR protocol based full-duplex energy harvesting over Rayleigh fading channel: system
performance analysis," Indonesian Journal of Electrical Engineering and Computer Science, vol. 13, no. 2,
pp. 534-542, Feb. 2019.
[17] Tan N. Nguyen, Minh Tran, D.-H. Ha, T. Tran and M. Voznak,"Multi-Source in DF Cooperative Networks With
PSR protocol Based Full-Duplex Energy Harvesting Over Rayleigh Fading Channel: Performance Analysis,"
Proceedings of the Estonian Academy of Sciences, vol. 68, no. 3, pp. 264-275, May. 2019. (SCIE, IF 0.51-2018.
[18] Tan N. Nguyen, T. H. Q.M inh, T.-L. Nguyen, D.-H. Ha and M. Voznak, "Performance Analysis of a User
Selection Protocol in Cooperative Networks with Power Splitting Protocol Based Energy Harvesting Over
Nakagami-m/Rayleigh Channel", Electronics, vol. 8, no. 4, art. no. 448, Apr. 2019.
[19] T. N. Nguyen, M. Tran, T. Nguyen and M. Voznak, "Adaptive relaying protocol for decode and forward
full-duplex system over Rician fading channel: System performance analysis," in China Communications, vol. 16,
no. 3, pp. 92-102, March 2019.
[20] Tan N. Nguyen, T. H. Q. Minh, T.-L. Nguyen, D.-H. Ha and M. Voznak," Multi-Source Power Splitting Energy
Harvesting Relaying Network In Half-Duplex System Over Block Rayleigh Fading Channel: System Performance
Analysis", Electronics, vol. 8, no. 1, Art. no. 67, Jan 2019.
[21] Tan N. Nguyen, M. Tran, P. T. Tran, T. Phu, T.-L. Nguyen, D.-H. Ha and M. Voznak, "On the Performance of
Power Splitting Energy Harvested Wireless Full-Duplex Relaying Network with Imperfect CSI over Dissimilar
Channels," Security and Communication Networks, Vol.2018, 11 pages, Art.no.6036087, Jan. 2019.
[22] J. Chen, L. Yang, and M.-S. Alouini, “Physical layer security for cooperative NOMA systems,” IEEE Trans. Veh.
Technol, vol. 67, no. 5, pp. 4645-4649, 2018.
[23] F. Zhou, Z. Chu, H. Sun, R. Q. Hu, and L. Hanzo, “Artificial Noise Aided Secure Cognitive Beamforming for
Cooperative MISO-NOMAUsingSWIPT,” IEEE J. Sel. Areas Commun, vol. 36, no. 4, pp. 918-931, 2018.
[24] Z. Yang, J. A. Hussein, P. Xu, Z. Ding, and Y. Wu, “Power Allocation Study for Non-Orthogonal Multiple Access
Networks with Multicast Unicast Transmission,” IEEE Trans. Wirel. Commun, vol. 17, no. 6, pp. 3588-3599, 2018.
[25] L. Xu, A. Nallanathan, X. Pan, J. Yang, and W. Liao, “Security-Aware Resource Allocation with Delay Constraint
for NOMA-Based Cognitive Radio Network,” IEEE Trans. Inf. Forensics Secure, vol. 13, no. 2, pp. 366-376, 2018.