This document studies the outage performance of two secondary destinations in a cognitive radio non-orthogonal multiple access (CR-NOMA) network. It presents a system model of a downlink dual-hop CR-NOMA network consisting of a primary destination, secondary source, relay, and two secondary destinations. It derives the exact outage probability expressions for the secondary users by obtaining the signal-to-interference-plus noise ratio and signal-to-noise ratio for each transmission. The results show that the performance gap between the two secondary users can be obtained due to different power allocation factors assigned to each user.
Implement of multiple access technique by wireless power transfer and relayin...journalBEEI
In this paper, we investigate non-orthogonal multiple access (NOMA) network relying on wireless power transfer to prolong lifetime. The base station (BS) sends common signals to the relay with two functions (energy harvesting (EH) and signal processing) to further serve two NOMA users in downlink. Performance gap exists since different power allocation factor assigned from power splitting protocol adopted at the relay and such relay employs both amplify-and-forward (AF) and decode-and-forward schemes. To provide performance metrics, we prove formulas of the outage probability which is a function of transmit signal to noise ratio. Simulation results indicate specific parameters to adjust system performance of two user in the considered EH-NOMA system. This finding is important recommendation to design EH-NOMA which shows particular outage performance at required target rates.
Study on transmission over Nakagami-m fading channel for multiple access sche...TELKOMNIKA JOURNAL
In this paper, a downlink performance in non-orthogonal multiple access (NOMA) system is considered. With regard to different priority for two NOMA users, we exploit the closed-form expressions of outage probability over wireless fading channel following Nakagami-m fading. The fixed power allocation factor scheme is examined to reduce the complexity in computation regarding performance analysis. In our analysis, perfect successive interference cancellation (SIC) is applied in order to achieve perfect signal decoding operation. Simulation results show that the considered NOMA downlink scheme is affected by transmit SNR, power allocation factors, fading parameters.
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...TELKOMNIKA JOURNAL
In this study, we deploy design and performance analysis in new system model using a relaying
model, energy harvesting, and non-orthogonal multi-access (NOMA) network. It is called such topology as
wireless powered NOMA relaying (WPNR). In the proposed model, NOMA will be investigated in two
cases including single successive interference cancellation (SIC) and dual SIC. Moreover,
the simultaneous wireless information and power transfer (SWIPT) technology can be employed to feed
energy to relays who intend to serve far NOMA users. In particular, exact outage probability expressions
are provided to performance evaluation. The results from the simulations are used to demonstrate
the outage performance of the proposed model in comparison with the current models and to verify correct
of derived expressions.
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksTELKOMNIKA JOURNAL
The strictly positive secrecy capacity (SPSC) performance is examined in a new design of non-orthogonal multiple access (NOMA) considered in this study. This system model employs Amplify-and-Forward (AF) relaying scheme to serve far users. In this scheme, a transmitter sends confidential signal to far users. It can be raised falling performance in the presence of an external eavesdropper in such NOMA system. With regard to orthogonal multiple access (OMA), performance of NOMA system model is compared. In particular, tradeoff the SPSC performance and transmit SNR is examined. In this study, the SPSC is evaluated as the secrecy metric to limit impacts of the practical passive eavesdropper in real scenario. It is confirmed that the secrecy performance of NOMA is significantly lower than OMA due to related parameters characterization in NOMA, and it should be controlled by varying related coefficients. As main results, both of NOMA and OMA against to impact of eavesdropper is studied in terms of analytically result and numerically result.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMATELKOMNIKA JOURNAL
In this paper, new radio access scheme that combines Amplify-and-Forward (AF) relaying protocol and non-orthogonal multiple access (NOMA) system is introduced. In particular, different scenarios for fixed power allocation scheme is investigated. In addition, the outage probability of both weak and strong user is derived and provided in closed-form expressions. Such outage is investigated in high SNR scenario and comparison performance between these NOMA scenarios is introduced. Numerical simulations are offered to clarify the outage performance of the considered scheme if varying several parameters in the existing schemes to verify the derived formulas.
A new look on CSI imperfection in downlink NOMA systemsjournalBEEI
Observing that cooperative scheme benefits to non-orthogonal multiple access (NOMA) systems, we focus on system performance analysis of downlink. However, spectrum efficiency is still high priority to be addressed in existing systems and hence this paper presents full-duplex enabling in NOMA systems. Other challenge needs be considered related to channel state information (CSI). In particular, we derive closedform expressions of outage probability for such NOMA systems under the presence of CSI imperfection. Furthermore, to fully exploit practical environment, we provide system model associated with Nakagami-m fading. The Monte-Carlo simulations are conducted to verify the exactness of considered systems.
Outage performance users located outside D2D coverage area in downlink cellul...journalBEEI
Device-to-device (D2D) communication has been proposed to employ the proximity between two devices to enhance the overall spectrum utilization of a crowded cellular network. With the help of geometric probability tools, this framework considers the performance of cellular users under spatial separation with the D2D pair is investigated. The measurement results and analytical expression of outage probability show that the proposed frameworks improve the outage performance at a high signal-tonoise ratio (SNR) at the base station. Results also interpret that the distances between nodes in the D2D-assisted network make slight impacts on the performance of the cellular user.
Implement of multiple access technique by wireless power transfer and relayin...journalBEEI
In this paper, we investigate non-orthogonal multiple access (NOMA) network relying on wireless power transfer to prolong lifetime. The base station (BS) sends common signals to the relay with two functions (energy harvesting (EH) and signal processing) to further serve two NOMA users in downlink. Performance gap exists since different power allocation factor assigned from power splitting protocol adopted at the relay and such relay employs both amplify-and-forward (AF) and decode-and-forward schemes. To provide performance metrics, we prove formulas of the outage probability which is a function of transmit signal to noise ratio. Simulation results indicate specific parameters to adjust system performance of two user in the considered EH-NOMA system. This finding is important recommendation to design EH-NOMA which shows particular outage performance at required target rates.
Study on transmission over Nakagami-m fading channel for multiple access sche...TELKOMNIKA JOURNAL
In this paper, a downlink performance in non-orthogonal multiple access (NOMA) system is considered. With regard to different priority for two NOMA users, we exploit the closed-form expressions of outage probability over wireless fading channel following Nakagami-m fading. The fixed power allocation factor scheme is examined to reduce the complexity in computation regarding performance analysis. In our analysis, perfect successive interference cancellation (SIC) is applied in order to achieve perfect signal decoding operation. Simulation results show that the considered NOMA downlink scheme is affected by transmit SNR, power allocation factors, fading parameters.
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...TELKOMNIKA JOURNAL
In this study, we deploy design and performance analysis in new system model using a relaying
model, energy harvesting, and non-orthogonal multi-access (NOMA) network. It is called such topology as
wireless powered NOMA relaying (WPNR). In the proposed model, NOMA will be investigated in two
cases including single successive interference cancellation (SIC) and dual SIC. Moreover,
the simultaneous wireless information and power transfer (SWIPT) technology can be employed to feed
energy to relays who intend to serve far NOMA users. In particular, exact outage probability expressions
are provided to performance evaluation. The results from the simulations are used to demonstrate
the outage performance of the proposed model in comparison with the current models and to verify correct
of derived expressions.
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksTELKOMNIKA JOURNAL
The strictly positive secrecy capacity (SPSC) performance is examined in a new design of non-orthogonal multiple access (NOMA) considered in this study. This system model employs Amplify-and-Forward (AF) relaying scheme to serve far users. In this scheme, a transmitter sends confidential signal to far users. It can be raised falling performance in the presence of an external eavesdropper in such NOMA system. With regard to orthogonal multiple access (OMA), performance of NOMA system model is compared. In particular, tradeoff the SPSC performance and transmit SNR is examined. In this study, the SPSC is evaluated as the secrecy metric to limit impacts of the practical passive eavesdropper in real scenario. It is confirmed that the secrecy performance of NOMA is significantly lower than OMA due to related parameters characterization in NOMA, and it should be controlled by varying related coefficients. As main results, both of NOMA and OMA against to impact of eavesdropper is studied in terms of analytically result and numerically result.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMATELKOMNIKA JOURNAL
In this paper, new radio access scheme that combines Amplify-and-Forward (AF) relaying protocol and non-orthogonal multiple access (NOMA) system is introduced. In particular, different scenarios for fixed power allocation scheme is investigated. In addition, the outage probability of both weak and strong user is derived and provided in closed-form expressions. Such outage is investigated in high SNR scenario and comparison performance between these NOMA scenarios is introduced. Numerical simulations are offered to clarify the outage performance of the considered scheme if varying several parameters in the existing schemes to verify the derived formulas.
A new look on CSI imperfection in downlink NOMA systemsjournalBEEI
Observing that cooperative scheme benefits to non-orthogonal multiple access (NOMA) systems, we focus on system performance analysis of downlink. However, spectrum efficiency is still high priority to be addressed in existing systems and hence this paper presents full-duplex enabling in NOMA systems. Other challenge needs be considered related to channel state information (CSI). In particular, we derive closedform expressions of outage probability for such NOMA systems under the presence of CSI imperfection. Furthermore, to fully exploit practical environment, we provide system model associated with Nakagami-m fading. The Monte-Carlo simulations are conducted to verify the exactness of considered systems.
Outage performance users located outside D2D coverage area in downlink cellul...journalBEEI
Device-to-device (D2D) communication has been proposed to employ the proximity between two devices to enhance the overall spectrum utilization of a crowded cellular network. With the help of geometric probability tools, this framework considers the performance of cellular users under spatial separation with the D2D pair is investigated. The measurement results and analytical expression of outage probability show that the proposed frameworks improve the outage performance at a high signal-tonoise ratio (SNR) at the base station. Results also interpret that the distances between nodes in the D2D-assisted network make slight impacts on the performance of the cellular user.
Outage performance of downlink NOMA-aided small cell network with wireless po...journalBEEI
This article considers the outage performance of the downlink transmission for a small cell network in a heterogeneous network. Due to mobility and distribution of users, it is necessary to study massive connections and high energy efficiency for such kind of systems. To be an enabler of energy harvesting, a power beacon is helpful to support the base station to send signals to distant users, and wireless power transfer (WPT) is exploited to guarantee the data packets transmission from the power beacon to the base station. To provide massive connections, we propose a novel non-orthogonal multiple access (NOMA) technique combined with WPT to enhance outage performance and latency reduction. Furthermore, we derive outage probability (OP) to characterize the system performance. Simulation results are verified to match well between theoretical and analytical methods, and main parameters are determined to understand how they affect the proposed scheme.
Circularly polarized antenna array based on hybrid couplers for 5G devicesjournalBEEI
This paper depicts a wideband circularly polarized (CP) antenna for 5G devices. The antenna array has a 3D structure including four simple printed dipole elements with directional radiations, high gain, and high efficiency. It achieves a CP by using the sequential rotation (SR) feeding based on 90°-3dB hybrid couplers in the proposed feeding network. The antenna array bandwidth is wide, 26.7%, with an operating frequency band from 3.35 GHz to 4.35 GHz. The antenna achieves a high peak gain of 10.73 dBi and high efficiency of 93.75%. Besides, the antenna gain is stable over the operating bandwidth (BW). At the centre operating frequency of 3.75 GHz, the angle of circular polarization is 51°. The antenna is designed and fabricated on the Rogers 4003 C substrate. The measured S11 is well matching with the simulation results. With the above characteristics, the proposed antenna can be a suitable candidate for 5G devices.
Estimating cellphone signal intensity & identifying radiation hotspot are...eSAT Journals
Abstract The increased uses of mobile phones have raised public interest in possible health issues associated with exposure to electromagnetic energy. For the speedy transmission and avoiding the construction of more towers, the single tower can be shared by multiple network operators. The simultaneous exposure to multiple frequency fields, the sum of all the radiation must be taken into consideration so the radiation intensity level exceeds by several times than the prescribed guideline. Hence, the public is being exposed to continuous, low intensity radiations from these towers. Present Survey has been designed to identify signal strength among the people dwelling near the base station. Signal Strength predicted by integration of NDVI methodology is taken into account for factors like trees, trunks, leaves, branches, their density and their heights relative to the antenna heights and also it has been calculated by both theoretical and practical. In this regard the present study, practical field investigations of existing towers have been done by using SCEPTOR (Mobile GIS/GPS receiver). These GPS data fed to GIS for creating a new layer along with DEM file and satellite image for creating virtual model.3D city model has been performed for the study area. Finally the radiation hotspot area has been identified by using viewshed analysis. Keywords: RF Coverage, Signal Strength, GIS, Remote Sensing, GPS, and Antenna
Performance analysis of beam divergence propagation through rainwater and sno...journalBEEI
In the present work the future communication requirements need to fulfill with high data rate, FSO (free space optic) with it is tremendous potential is the solution. This research observed the effectiveness analysis of FSO systems by modifying one of the most important FSO parameters beam divergence, under the most affected weather attenuating condition Rainwater and snow pack. The simulation is obtained and analyzed under single channels CSRZ-FSO (carrier-suppressed return-to-zero/free space optical) systems having capacity of 40 Gbps between two transceivers with variable distance. The connection is presently under 5 meteorological turbulences (light rain, medium rain, wet snow, heavy rain and dry snow). The results show the heavy rain and dry snow have a very high attenuation carried out in terms of Q-factor. this result led us to conclude that small divergence offers significant performance improvement for FSO link and this performance decrease every time the beam divergence increase, Therefore, to build inexpensive and reliable transmission media, we go with new method that still in the experiment area called hybrid RF/FSO (radio frequency/free space optical) that compatible with atmospherically status.
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Journals
Abstract The design of Multi Carrier Direct Sequence Code Division Multiple Access (MC-DS-CDMA) structure which generalizes serial and parallel concatenated code is investigated to this project. This model is ideal for designing various codes in the performance of both error floor and water floor region. We propose a concatenated code for transmitter block which is used for multi carrier direct sequence CDMA technique. Simulation results of MC-DS-CDMA uplink system using Cadence software shows the various parameters such as memory, Execution time and number of transient steps required for the Execution of MC-DS-CDMA uplink system was estimated and also power consumed was determined for each block in the transmitter. An improved concatenated code model is used for uplink mobile communication. Further system performance improvements can be obtained by concatenating inner code and outer code and the results of computer simulations demonstrate that the performance of the concatenated code was investigated. Keywords: Code Division Multiple Access, Concatenated code, inner code, outer code, interleaving and power analysis.
Design and analysis of microstrip antenna with zig-zag feeder for wireless co...journalBEEI
This paper is presented a microstrip antenna with a zig-zag feeder for wireless communication, it has a wideband frequency spectrum (2-14) GHz. The proposed antenna is designed with a zig zag feed line which gave a wideband frequency and acceptable gain (7.448-5.928) dB, this antenna has zig zag slots printed in the ground plane on a lower side of the dielectric substrate, a certain form tuning stub is used to increase the matching between the feeder in the top layer of the substrate and ground plane in the bottom, this stub has an elliptical slot to performance matching input impedance with the feed line. The feeding technique used to feed this antenna is a strip feed line of 50 Ω. Different types of techniques are used to enhance the bandwidth of this antenna to get a wideband suitable for the requirements of the UWB antenna such as adjust the feed point position of the feed line with a tuning stub. All the radiation properties of the presented antenna are tested such as bandwidth, radiation pattern, and, gain.
On limits of Wireless Communications in a Fading Environment: a General Param...ijeei-iaes
The reliable services along with high throughput can be achieved by using wireless communication systems. These systems also provides a wide coverage because of their features, no doubt MIMO Communication System [1] is one among them. Features provided by these systems ensure the improved system coverage and increased data transmission rate by considering multiple numbers of transmitter and receiver antennas. In this article, the concept of equalization has been considered and finally the performance of the MIMO Systems in Rician flat fading [5] channel is compared with the Rayleigh flat fading channel. It has also been observed that the performance of these Systems in Rician Flat Fading Channel is the best as compare to the Rayleigh Flat Fading Channel [10]. It has been concluded that the successive interference methods provide better performance as compare to others, but their complexity is high. Simulation results shows that ML provides the better performance in comparison to other equalizers but Sphere decoder provides the best performance.
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELSIJCNCJournal
The Multiple-input multiple-output (MIMO) technique combined with non-orthogonal multiple access (NOMA) has been considered to enhance total system performance. This paper studies the bit error rate of two-user power-domain NOMA systems using successive interference cancellation receivers, with zeroforcing equalization over quasi-static Rayleigh fading channels. Successive interference cancellation technique at NOMA receivers has been the popular research topic due to its simple implementation, despite its vulnerability to error propagation. Closed-form expressions are derived for downlink NOMA in single-input single-output and uncorrelated quasi-static MIMO Rayleigh fading channel. Analytical results are consolidated with Monte Carlo simulation.
Equalization & Channel Estimation of Block & Comb Type CodesAM Publications
Multi-carrier code division multiple access is an attractive choice for high speed wireless communication as it mitigates
the problem of inter symbol interference and also exploits frequency diversity. The work described in this paper is my effort in this
direction. In this paper working of Transmitter and Receiver model of MCCDMA system is presented. We evaluated interference
and bit error rate for multicarrier code division multiple access wireless communication system. In this thesis my concern is find
out the effect of interference in MC-CDMA system. We find out the effect of number of users and signal power on different
parameters for MC-CDMA system. Simulations are given to support the system and receiver design. All the simulation is carried out on MATLAB tool.
Effect on Channel Capacity of Multi-User MIMO System in Crowded AreaIJEEE
Multiple-Input Multiple-Output (MIMO) and Multi-User
MIMO (MU-MIMO) systems have been expected to
improve the channel capacity over a limited bandwidth of
existing networks.
Wireless communication now has been focus to increase data rate and high performance. The
multi carrier on multi-hop communication system using relay's diversity technique which is
supported by a reliable coding is a system that may give high performance.
This research is developing a model of multi carrier CDMA on multi hop communication
system with diversity technique which is using Alamouti codes in Rayleigh fading channel. By
Alamouti research, Space Time Block Code (STBC) for MIMO system can perform high quality
signal at the receiver in the Rayleigh fading channel and the noisy system. In this research,
MIMO by STBC is applied to single antenna system (Distributed-STBC/DSTBC) with multi
carrier CDMA on multi hop wireless communication system (relay diversity) which is able to
reduce the complexity of the system but the system performance even can be maintained and
improved.
MC CDMA on multi hop wireless communication system with 2 hops is performing much better
than Single Input Single Output (SISO) system (1 hop system). Power needed for 1 hop system to
have the same quality as 2 hops system to reach BER 10-3 is 12 dB. And multi hop system needs
orthogonal symbol to send from relay than original symbol to reach better performance. 12.5
dB power up is needed for multi hop system which sent same symbol as transmitter than relay
system which sent orthogonal symbol.
In this research paper, substrate integrated waveguide (SIW) was proposed as a technique by
realizing bilateral edge walls to produce a compact 5G beam-steering antenna at 24 GHz. The beam
forming network is produced using SIW directional coupler perform as 2×2 Butler Matrix (BM) fed with SIW
slotted waveguide antenna array. The output signal is steered from -29 degrees and +29 degrees when
the signal is fed to the respective input ports. If one of the input ports is fed, the signal is evenly distributed
between the adjacent output ports with 90 degree constant phase shift. The compact size of directional
coupler was designed by longitude slots on the surface of SIW substrate with bandwith of 16.85% at the
operating frequency. The proposed antenna produce gain of 6.34 dB at operating frequency and the
promising outcome of the beam steering make proposed design suitable for 5G communications especially
with tracking capabilities.
Secure outage probability of cognitive radio network relying non-orthogonal m...journalBEEI
This paper studies the secondary network relying relay selection to transmit signal from the secondary source (base station) to two destinations. Especially, two destinations are required non-orthogonal multiple access (NOMA) scheme and it benefits to implementation of the Internet of Things (IoT) systems. However, eavesdropper over-hears signal related link from selected relay to destination. This paper measure secure performance via metric, namely secure outage probability (SOP). In particular, signal to noise ratio (SNR) criterion is used to evalute SOP to provide reliable transmission to the terminal node. Main results indicates that the considered scheme provides performance gap among two signals at destination. The exactness of derived expressions is confirmed via numerical simulation.
Security performance analysis for power domain NOMA employing in cognitive ra...journalBEEI
The power domain non-orthogonal multiple access (NOMA) technique introduces one of the fundamental characteristics and it exhibits the possibility of users to decode the messages of the other paired users on the same resources. In cognitive radio inspired NOMA (CR-NOMA), the base station (BS) has to serve untrusted users or users with different security clearance. This phenomenon raises a security threat particularly in such CR-NOMA. This paper develops a tractable analysis framework to evaluate the security performance of cooperative non-orthogonal multiple access (NOMA) in cognitive networks, where relay is able to serve two far NOMA users in the presence of external eavesdropper. In particular, we study the secrecy outage probability in a two-user NOMA system. This situation happens in practical the BS is pairing a legitimate user with another untrusted user. Main reason is that the non-uniform distribution in terms of trusted and untrusted users in the cell. By performing numerical results demonstrate the performance improvements of the proposed NOMA scheme in comparison to that of several situations in terms of different parameters. Furthermore, the security performance of NOMA is shown to verify the derived expressions.
Tractable computation in outage performance analysis of relay selection NOMATELKOMNIKA JOURNAL
In recent years, using full-duplex (FD) transmission model provides enhanced bandwidth efficiency and improved performance for non-orthogonal multiple access (NOMA) system. However, lack of papers have investigated FD relay together with relay selection issue to improve performance of NOMA system. The problems in power allocation for two NOMA users satisfying fairness as well as relay selection strategy are studied in this paper. By considering the outage performance of proposed scheme with its vital result, general NOMA wireless networks can be developed for future networks due to its improved performance. Simulation results show that the relaying selection scheme can achieve a significant performance improvement by increasing required quantity of relay.
Outage performance of downlink NOMA-aided small cell network with wireless po...journalBEEI
This article considers the outage performance of the downlink transmission for a small cell network in a heterogeneous network. Due to mobility and distribution of users, it is necessary to study massive connections and high energy efficiency for such kind of systems. To be an enabler of energy harvesting, a power beacon is helpful to support the base station to send signals to distant users, and wireless power transfer (WPT) is exploited to guarantee the data packets transmission from the power beacon to the base station. To provide massive connections, we propose a novel non-orthogonal multiple access (NOMA) technique combined with WPT to enhance outage performance and latency reduction. Furthermore, we derive outage probability (OP) to characterize the system performance. Simulation results are verified to match well between theoretical and analytical methods, and main parameters are determined to understand how they affect the proposed scheme.
Circularly polarized antenna array based on hybrid couplers for 5G devicesjournalBEEI
This paper depicts a wideband circularly polarized (CP) antenna for 5G devices. The antenna array has a 3D structure including four simple printed dipole elements with directional radiations, high gain, and high efficiency. It achieves a CP by using the sequential rotation (SR) feeding based on 90°-3dB hybrid couplers in the proposed feeding network. The antenna array bandwidth is wide, 26.7%, with an operating frequency band from 3.35 GHz to 4.35 GHz. The antenna achieves a high peak gain of 10.73 dBi and high efficiency of 93.75%. Besides, the antenna gain is stable over the operating bandwidth (BW). At the centre operating frequency of 3.75 GHz, the angle of circular polarization is 51°. The antenna is designed and fabricated on the Rogers 4003 C substrate. The measured S11 is well matching with the simulation results. With the above characteristics, the proposed antenna can be a suitable candidate for 5G devices.
Estimating cellphone signal intensity & identifying radiation hotspot are...eSAT Journals
Abstract The increased uses of mobile phones have raised public interest in possible health issues associated with exposure to electromagnetic energy. For the speedy transmission and avoiding the construction of more towers, the single tower can be shared by multiple network operators. The simultaneous exposure to multiple frequency fields, the sum of all the radiation must be taken into consideration so the radiation intensity level exceeds by several times than the prescribed guideline. Hence, the public is being exposed to continuous, low intensity radiations from these towers. Present Survey has been designed to identify signal strength among the people dwelling near the base station. Signal Strength predicted by integration of NDVI methodology is taken into account for factors like trees, trunks, leaves, branches, their density and their heights relative to the antenna heights and also it has been calculated by both theoretical and practical. In this regard the present study, practical field investigations of existing towers have been done by using SCEPTOR (Mobile GIS/GPS receiver). These GPS data fed to GIS for creating a new layer along with DEM file and satellite image for creating virtual model.3D city model has been performed for the study area. Finally the radiation hotspot area has been identified by using viewshed analysis. Keywords: RF Coverage, Signal Strength, GIS, Remote Sensing, GPS, and Antenna
Performance analysis of beam divergence propagation through rainwater and sno...journalBEEI
In the present work the future communication requirements need to fulfill with high data rate, FSO (free space optic) with it is tremendous potential is the solution. This research observed the effectiveness analysis of FSO systems by modifying one of the most important FSO parameters beam divergence, under the most affected weather attenuating condition Rainwater and snow pack. The simulation is obtained and analyzed under single channels CSRZ-FSO (carrier-suppressed return-to-zero/free space optical) systems having capacity of 40 Gbps between two transceivers with variable distance. The connection is presently under 5 meteorological turbulences (light rain, medium rain, wet snow, heavy rain and dry snow). The results show the heavy rain and dry snow have a very high attenuation carried out in terms of Q-factor. this result led us to conclude that small divergence offers significant performance improvement for FSO link and this performance decrease every time the beam divergence increase, Therefore, to build inexpensive and reliable transmission media, we go with new method that still in the experiment area called hybrid RF/FSO (radio frequency/free space optical) that compatible with atmospherically status.
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Journals
Abstract The design of Multi Carrier Direct Sequence Code Division Multiple Access (MC-DS-CDMA) structure which generalizes serial and parallel concatenated code is investigated to this project. This model is ideal for designing various codes in the performance of both error floor and water floor region. We propose a concatenated code for transmitter block which is used for multi carrier direct sequence CDMA technique. Simulation results of MC-DS-CDMA uplink system using Cadence software shows the various parameters such as memory, Execution time and number of transient steps required for the Execution of MC-DS-CDMA uplink system was estimated and also power consumed was determined for each block in the transmitter. An improved concatenated code model is used for uplink mobile communication. Further system performance improvements can be obtained by concatenating inner code and outer code and the results of computer simulations demonstrate that the performance of the concatenated code was investigated. Keywords: Code Division Multiple Access, Concatenated code, inner code, outer code, interleaving and power analysis.
Design and analysis of microstrip antenna with zig-zag feeder for wireless co...journalBEEI
This paper is presented a microstrip antenna with a zig-zag feeder for wireless communication, it has a wideband frequency spectrum (2-14) GHz. The proposed antenna is designed with a zig zag feed line which gave a wideband frequency and acceptable gain (7.448-5.928) dB, this antenna has zig zag slots printed in the ground plane on a lower side of the dielectric substrate, a certain form tuning stub is used to increase the matching between the feeder in the top layer of the substrate and ground plane in the bottom, this stub has an elliptical slot to performance matching input impedance with the feed line. The feeding technique used to feed this antenna is a strip feed line of 50 Ω. Different types of techniques are used to enhance the bandwidth of this antenna to get a wideband suitable for the requirements of the UWB antenna such as adjust the feed point position of the feed line with a tuning stub. All the radiation properties of the presented antenna are tested such as bandwidth, radiation pattern, and, gain.
On limits of Wireless Communications in a Fading Environment: a General Param...ijeei-iaes
The reliable services along with high throughput can be achieved by using wireless communication systems. These systems also provides a wide coverage because of their features, no doubt MIMO Communication System [1] is one among them. Features provided by these systems ensure the improved system coverage and increased data transmission rate by considering multiple numbers of transmitter and receiver antennas. In this article, the concept of equalization has been considered and finally the performance of the MIMO Systems in Rician flat fading [5] channel is compared with the Rayleigh flat fading channel. It has also been observed that the performance of these Systems in Rician Flat Fading Channel is the best as compare to the Rayleigh Flat Fading Channel [10]. It has been concluded that the successive interference methods provide better performance as compare to others, but their complexity is high. Simulation results shows that ML provides the better performance in comparison to other equalizers but Sphere decoder provides the best performance.
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELSIJCNCJournal
The Multiple-input multiple-output (MIMO) technique combined with non-orthogonal multiple access (NOMA) has been considered to enhance total system performance. This paper studies the bit error rate of two-user power-domain NOMA systems using successive interference cancellation receivers, with zeroforcing equalization over quasi-static Rayleigh fading channels. Successive interference cancellation technique at NOMA receivers has been the popular research topic due to its simple implementation, despite its vulnerability to error propagation. Closed-form expressions are derived for downlink NOMA in single-input single-output and uncorrelated quasi-static MIMO Rayleigh fading channel. Analytical results are consolidated with Monte Carlo simulation.
Equalization & Channel Estimation of Block & Comb Type CodesAM Publications
Multi-carrier code division multiple access is an attractive choice for high speed wireless communication as it mitigates
the problem of inter symbol interference and also exploits frequency diversity. The work described in this paper is my effort in this
direction. In this paper working of Transmitter and Receiver model of MCCDMA system is presented. We evaluated interference
and bit error rate for multicarrier code division multiple access wireless communication system. In this thesis my concern is find
out the effect of interference in MC-CDMA system. We find out the effect of number of users and signal power on different
parameters for MC-CDMA system. Simulations are given to support the system and receiver design. All the simulation is carried out on MATLAB tool.
Effect on Channel Capacity of Multi-User MIMO System in Crowded AreaIJEEE
Multiple-Input Multiple-Output (MIMO) and Multi-User
MIMO (MU-MIMO) systems have been expected to
improve the channel capacity over a limited bandwidth of
existing networks.
Wireless communication now has been focus to increase data rate and high performance. The
multi carrier on multi-hop communication system using relay's diversity technique which is
supported by a reliable coding is a system that may give high performance.
This research is developing a model of multi carrier CDMA on multi hop communication
system with diversity technique which is using Alamouti codes in Rayleigh fading channel. By
Alamouti research, Space Time Block Code (STBC) for MIMO system can perform high quality
signal at the receiver in the Rayleigh fading channel and the noisy system. In this research,
MIMO by STBC is applied to single antenna system (Distributed-STBC/DSTBC) with multi
carrier CDMA on multi hop wireless communication system (relay diversity) which is able to
reduce the complexity of the system but the system performance even can be maintained and
improved.
MC CDMA on multi hop wireless communication system with 2 hops is performing much better
than Single Input Single Output (SISO) system (1 hop system). Power needed for 1 hop system to
have the same quality as 2 hops system to reach BER 10-3 is 12 dB. And multi hop system needs
orthogonal symbol to send from relay than original symbol to reach better performance. 12.5
dB power up is needed for multi hop system which sent same symbol as transmitter than relay
system which sent orthogonal symbol.
In this research paper, substrate integrated waveguide (SIW) was proposed as a technique by
realizing bilateral edge walls to produce a compact 5G beam-steering antenna at 24 GHz. The beam
forming network is produced using SIW directional coupler perform as 2×2 Butler Matrix (BM) fed with SIW
slotted waveguide antenna array. The output signal is steered from -29 degrees and +29 degrees when
the signal is fed to the respective input ports. If one of the input ports is fed, the signal is evenly distributed
between the adjacent output ports with 90 degree constant phase shift. The compact size of directional
coupler was designed by longitude slots on the surface of SIW substrate with bandwith of 16.85% at the
operating frequency. The proposed antenna produce gain of 6.34 dB at operating frequency and the
promising outcome of the beam steering make proposed design suitable for 5G communications especially
with tracking capabilities.
Secure outage probability of cognitive radio network relying non-orthogonal m...journalBEEI
This paper studies the secondary network relying relay selection to transmit signal from the secondary source (base station) to two destinations. Especially, two destinations are required non-orthogonal multiple access (NOMA) scheme and it benefits to implementation of the Internet of Things (IoT) systems. However, eavesdropper over-hears signal related link from selected relay to destination. This paper measure secure performance via metric, namely secure outage probability (SOP). In particular, signal to noise ratio (SNR) criterion is used to evalute SOP to provide reliable transmission to the terminal node. Main results indicates that the considered scheme provides performance gap among two signals at destination. The exactness of derived expressions is confirmed via numerical simulation.
Security performance analysis for power domain NOMA employing in cognitive ra...journalBEEI
The power domain non-orthogonal multiple access (NOMA) technique introduces one of the fundamental characteristics and it exhibits the possibility of users to decode the messages of the other paired users on the same resources. In cognitive radio inspired NOMA (CR-NOMA), the base station (BS) has to serve untrusted users or users with different security clearance. This phenomenon raises a security threat particularly in such CR-NOMA. This paper develops a tractable analysis framework to evaluate the security performance of cooperative non-orthogonal multiple access (NOMA) in cognitive networks, where relay is able to serve two far NOMA users in the presence of external eavesdropper. In particular, we study the secrecy outage probability in a two-user NOMA system. This situation happens in practical the BS is pairing a legitimate user with another untrusted user. Main reason is that the non-uniform distribution in terms of trusted and untrusted users in the cell. By performing numerical results demonstrate the performance improvements of the proposed NOMA scheme in comparison to that of several situations in terms of different parameters. Furthermore, the security performance of NOMA is shown to verify the derived expressions.
Tractable computation in outage performance analysis of relay selection NOMATELKOMNIKA JOURNAL
In recent years, using full-duplex (FD) transmission model provides enhanced bandwidth efficiency and improved performance for non-orthogonal multiple access (NOMA) system. However, lack of papers have investigated FD relay together with relay selection issue to improve performance of NOMA system. The problems in power allocation for two NOMA users satisfying fairness as well as relay selection strategy are studied in this paper. By considering the outage performance of proposed scheme with its vital result, general NOMA wireless networks can be developed for future networks due to its improved performance. Simulation results show that the relaying selection scheme can achieve a significant performance improvement by increasing required quantity of relay.
Outage and throughput performance of cognitive radio based power domain based...TELKOMNIKA JOURNAL
This paper considers power domain based multiple access (PDMA) in cognitive radio network to serve numerous users who intend to multiple access to core network. In particular, we investigate the effect of signal combination scheme equipped at PDMA end-users as existence of direct link and relay link. This system model using relay scheme provides performance improvement on the outage probability of two PDMA end-users. We first propose a simple scheme of fixed power allocation to PDMA users who exhibit performance gap and fairness. Inspired by PDMA strategy, we then find signal to noise ratio (SNR) to detect separated signal for each user. In addition, the exact expressions of outage probability are derived in assumption that receiver can cancel out the interference completely with successive interference cancellation (SIC). By exploiting theoretical and simulation results, both considered combination schemes (Maximal Ratio Combining (MRC) and Selection Combining (SC) can achieve improved performance of two PDMA users significantly.
Analysis on the performance of pointing error effects for RIS-aided FSO link ...TELKOMNIKA JOURNAL
In this study, we analysis on the performance of pointing error effects for reconfigurable intelligent surfeces (RISs) aided free-space optical (FSO) communication link over moderate to strong atmospheric turbulence channels. Among these solutions, RISs are considered as hardware technology to improve performance of optical wireless communication systems. Performance evaluation of systems is affected by atmospheric attenuation, pointing errors and moderate to strong atmospheric turbulence channels for quadrature amplitude modulation (QAM) technique. Atmospheric turbulence channel from moderate to strong is modeled using gamma-gamma distribution. Several numerical results obtained the average symbol error rate (ASER) performance versus beam waist radius and signal to noise ratio for three value of pointing error displacement standard deviation. From the results, it is show that with RIS assisted can effectively improve the performance and link distance of the wireless communication systems.
Enabling relay selection in non-orthogonal multiple access networks: direct a...TELKOMNIKA JOURNAL
In this paper, we consider downlink non-orthogonal multiple access (NOMA) in which the relay selection (RS) scheme is enabled for cooperative networks. In particular, we investigate impact of the number of relays on system performance in term of outage probability. The main factors affecting on cooperative NOMA performance are fixed power allocations coefficients and the number of relay. This paper also indicate performance gap of the outage probabilities among two users the context of NOMA. To exhibit the exactness of derived formula, we match related results between simulation and analytical methods. Numerical results confirms that cooperative NOMA networks benefit from increasing the number of relay.
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...journalBEEI
Non-orthogonal multiple access (NOMA) with advantages such as superior spectral efficiency has been considered as a promising multiple access technique for the fifth-generation (5G) mobile networks. In this research, we propose energy harvesting (EH) NOMA system relaying network over Rayleigh fading channel using selection combining at the receiver. Firstly, we investigate the system performance in terms of the closed-form expression of the outage probability (OP). Here we compare the OP of two destination users of the proposed system. Finally, all the results is convinced by the Monte Carlo simulation. From the results, we can confirm that all the analytical and simulation results are the same in connection with the primary system parameters.
Cooperative underlay cognitive radio assisted NOMA: secondary network improve...TELKOMNIKA JOURNAL
In this paper, a downlink scenario of a non-orthogonal multiple access (NOMA) scheme with power constraint via spectrum sensing is considered. Such network provides improved outage performance and new scheme of NOMA-based cognitive radio (CR-NOMA) network are introduced. The different power allocation factors are examined subject to performance gap among these secondary NOMA users. To evaluate system performance, the exact outage probability expressions of secondary users are derived. Finally, the dissimilar performance problem in term of secondary users is illustrated via simulation, in which a power allocation scheme and the threshold rates are considered as main impacts of varying system performance. The simulation results show that the performance of CR-NOMA network can be improved significantly.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Joint impacts of relaying scheme and wireless power transfer in multiple acce...journalBEEI
This paper considers ergodic capacity of energy harvesting (EH) based cellular networks. Such a network employs non-orthogonal multiple access (NOMA) together with relaying scheme to serve two far users. In this system model, relay is facilitated power splitting (PS) protocol to implement energy harvesting (EH). To examine capacity, expressions of signal to noise ratio (SNR) need be computed to achieve capacity. Power allocation factors are different for two users in such system and hence performance gap happens to distinguish requirements for separated users. It can be confirmed that the proposed paradigm exhibits maximal achievable capacity in some scenarios of setting parameters. To confirm exactness of the analytical expressions and show advantages of the proposed EH-NOMA, simulation results are performed in terms of ergodic capacity.
Enabling full-duplex in multiple access technique for 5G wireless networks ov...TELKOMNIKA JOURNAL
Nowadays, unmanned aerial vehicle (UAV) relays’assisted Internet of Things (IoT) systems provide facility in order to overcome the large scale fading between source and sink. The full-duplex scheme enables wireless network to provide higher spectrum efficient technology. This paper analyses performance of two users which are served by new emerging non-orthogonal multiple access (NOMA) technique. Exact outage probability of such two users are derived and checked via Monte-Carlo simulation. These analytical results provide guideline to design UAV in real application. This paper provides a comprehensive study to examine impact of interference, fixed power allocation factors to system performance.
Performance enhancement of wireless sensor network by using non-orthogonal mu...nooriasukmaningtyas
In this paper, we investigate a relaying wireless sensor network (WSN) with
the non-orthogonal multiple access (NOMA) and sensor node selection
schemes over rayleigh fading. Precisely, the system consists of two sensor
clusters, a sink node, and an amplify-and-forward (AF) relay. These sensors
applying the NOMA and sensor node selection schemes transmit the sensing
data from the sensor clusters via the relay to the sink. We derived the
expressions of outage probability and throughput for two sensor nodes. We
also provide numerical results to examine the behavior of the system. Finally,
we verify the validity of our analysis by using the monte-carlo simulation.
Adaptive relaying protocol for wireless energy harvesting and information pro...journalBEEI
In order to satisfy the increasing data rate demands, the research in the fifth-generation (5G) wireless networks is ongoing, both in academia and industry. In this research, we propose and investigate adaptive relaying protocol (ARP) For wireless energy harvesting (EH) and information processing in NOMA systems. Firstly, we investigate and derive the closed-form and integral-form expressions of the outage probability (OP) of the model system. Then, all the results are convinced by the Monte Carlo simulation. The research results show that all the analytical and simulation results are the same in connection with the primary system parameters. This research can provide a recommendation for NOMA system network.
Performance analysis for power-splitting energy harvesting based two-way full...TELKOMNIKA JOURNAL
Energy harvesting relay network is considered as the promising solution for a wireless
communication network in our time. In this research, we present and demonstrate the system performance
of the energy harvesting based two-way full-duplex relaying network over Nakagami-m fading
environment. Firstly, we propose the analytical expressions of the achievable throughput and outage
probability of the proposed system. In the second step, the effect of various system parameters on
the system performance is presented and investigated. In the final step, the analytical results are also
demonstrated by Monte-Carlo simulation. The numerical results demonstrated and convinced
the analytical and the simulation results are agreed with each other.
Performance of cluster-based cognitive multihop networks under joint impact o...TELKOMNIKA JOURNAL
In this paper, we evaluate outage probability (OP) of a cluster-based multi-hop protocol operating
on an underlay cognitive radio (CR) mode. The primary network consists of multiple independent
transmit/receive pairs, and the primary transmitters seriously cause co-channel interference (CCI) to the
secondary receivers. To improve the outage performance for the secondary network under the joint impact
of the CCI and hardware imperfection, we employ the best relay selection at each hop. Moreover, the
destination is equipped with multiple antennas and uses the selection combining (SC) technique to
enhance the reliability of the data transmission at the last hop. For performance evaluation, we first derive
an exact formula of OP for the primary network which is used to calculate the transmit power of the
secondary transmitters. Next, an exact closed-form expression of the end-to-end OP for the secondary
network is derived over Rayleigh fading channels. We then perform Monte-Carlo simulations to validate
the derivations. The results present that the CCI caused by the primary operations significantly impacts on
the outage performance of the secondary network.
Employing non-orthogonal multiple access scheme in UAV-based wireless networksjournalBEEI
This paper studies the two-hop transmission relying unmanned aerial vehicle (UAV) relays which is suitable to implement in the internet of things (IoT) systems. To enhance system performance in order to overcome the large scale fading between the base station (BS) and destination as well as achieve the higher spectrum efficiency, where non-orthogonal multiple access (NOMA) strategies were typically applied for UAV relays to implement massive connections transmission. In particular, outage probability is evaluated via signal to noise ratio (SNR) criterion so that the terminal node can obtain reasonable performance. The derivations and analysis results showed that the considered fixed power allocation scheme provides performance gap among two signals at destination.The numerical simulation confirmed the exactness of derived expressions in the UAV assisted system.
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...TELKOMNIKA JOURNAL
In the future wireless systems, non-orthogonal multiple-access (NOMA) with partial relay selection scheme is considered as developing research topic. In this paper, dual-hop relaying systems is deployed for NOMA, in which the signals are communicated with the assistance of decode-and-forward (DF) scheme. This paper presents exact expressions for outage probability over independent Rayleigh fading channels, and two partial relay selection schemes are provided. Using analytical result and Monte-Carlo method, we introduce forwarding strategy selection for fixed user allocation and exactness of derived formula is checked. The presented simulations confirm the the advantage of such proposed NOMA, and the effectiveness of the proposed forwarding strategy.
Outage performance analysis of non-orthogonal multiple access systems with RF...IJECEIAES
Non-orthogonal multiple access (NOMA) has drawn enormous attention from the research community as a promising technology for future wireless communications with increasing demands of capacity and throughput. Especially, in the light of fifth-generation (5G) communication where multiple internet-of-things (IoT) devices are connected, the application of NOMA to indoor wireless networks has become more interesting to study. In view of this, we investigate the NOMA technique in energy harvesting (EH) half-duplex (HD) decode-and-forward (DF) power-splitting relaying (PSR) networks over indoor scenarios which are characterized by log-normal fading channels. The system performance of such networks is evaluated in terms of outage probability (OP) and total throughput for delay-limited transmission mode whose expressions are derived herein. In general, we can see in details how different system parameters affect such networks thanks to the results from Monte Carlo simulations. For illustrating the accuracy of our analytical results, we plot them along with the theoretical ones for comparison.
In this paper, we design a secure transmission scheme in uplink and downlink of nonorthogonal
multiple access (NOMA) system. In this scenario, two pairs of base stationuser can operate under the presence of eavesdropper. The relay plays an important role to forward signals from group of base stations to serve distant users. However, the eavesdropper can overhear signal which leads to secure performance need be reconsidered. To provide secure performance, we derive the closed-form expressions for strictly positive secrecy capacity (SPSC). In addition, we rely on relay for enlarge coverage area. The channel conditions meet imperfect channel state information (CSI) which shows degraded secure performance. Results confirm the relationship between transmit power at the source and and SPSC how many main parameters affecting secure
performance metric. Furthermore, simulation results show that the uplink and downlink NOMA technique improves secure performance in the low SPSC region. We further conduct analysis by using Monte-Carlo simulations.
Physical security layer with friendly jammer in half-duplex relaying networks...journalBEEI
In this research, thephysical security layer with a friendly jammerin half-duplex (HD) relaying networksover the Rayleigh fading channel is proposed and investigated. Firstly, we proposed the system model and the time switching,power splitting protocolsfor the system model. Then we conductedthe mathematical analysisfor deriving the exact analysis and asymptotic analysisintegral forms for intercept probability (IP). Finally, the analytical formulationis verified by the Monte Carlo simulation with all main system parameters. From the results, we can show that the simulation and analytical values are the same values.
Similar to Study on outage performance gap of two destinations on CR-NOMA network (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Study on outage performance gap of two destinations on CR-NOMA network
1. TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 1, February 2020, pp. 191~198
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i1.13271 191
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Study on outage performance gap of two destinations on
CR-NOMA network
Hong-Nhu Nguyen1
, Chi-Bao Le2
, Nhat-Tien Nguyen3
, Dinh-Thuan Do4
1,3
Faculty of Electronics and Telecommunications, Saigon University, Ho Chi Minh City, Vietnam
2,4
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh City, Vietnam
Article Info ABSTRACT
Article history:
Received Jun 2, 2019
Revised Nov 11, 2019
Accepted Nov 30, 2019
Non-orthogonal multiple access (NOMA) and cognitive radio (CR) are
promising to overcome spectral scarcity problem encountered in applications
implementations in wireless communication. Especially, massive
connectivity in such network is strict requirement in network deployment.
This study aims to improve spectral efficiency at two secondary destinations
by investigating a CR-NOMA network under situation of the perfect
successive interference cancellation (SIC). We also derive the exact outage
probability for secondary users. Furthermore, an approximate computation
method is applied to indicate more insights. It is confirmed that
the performance achieved together with performance gap among two users
can be obtained due to different power allocation factors assigned to users.
Keywords:
Cognitive radio
Non-orthogonal multiple access
SIC
This is an open access article under the CC BY-SA license.
Corresponding Author:
Dinh-Thuan Do,
Faculty of Electronics Technology,
Industrial University of Ho Chi Minh City (IUH),
Ho Chi Minh City, Vietnam.
Email: dodinhthuan@iuh.edu.vn
1. INTRODUCTION
The spectral efficient and energy-efficient requirements are necessary to satisfy the explosive
increase of mobile user in wireless system with high-rate services. However, high spectral efficiency (SE)
cannot be achieved since the fixed spectrum allocation strategy is adopted. Unfortunately, 30 percentages of
the licensed spectrum in the United States is fully occupied as the report from the Federal Communications
Commission [1]. By allowing the primary network to share its frequency band with the secondary network,
cognitive radio (CR) has been studied and hence SE improvement achieved [2]. In principle of CR, spectrum
sharing paradigm permits the secondary users (SUs) to operate together with the primary users (PUs) at the
same band and power constraint must be obeyed to limit interference impact caused by the PUs [3, 4].
Several techniques such as cellular networks, relay networks, and wireless sensor networks, benefit from
implementation of CR to provide the potential SE improvement.
To further provide massive connectivity, more advantages can be achieved by employing multiple
access for mobile users. In particular, the network allocates resource to users by dividing the total radio
resources with two underlying techniques, i.e. orthogonal multiple access (OMA) and non-orthogonal
multiple access (NOMA). The interference can be eliminated in OMA scheme while NOMA employs
successive interference cancellation (SIC) technique to alleviate interference from other users’ signal [5]. By
exploiting the users’ channel asymmetry, NOMA can remarkably enhance the SE and then the transmission
latency can be reduced [5-8]. The authors in [9] showed that the achievable rate region in the uplink NOMA
is improved in comparison with OMA and such analysis is adopted in wireless powered communication
2. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 191 - 198
192
(WPC) networks. In [10], main results reported that NOMA with advantage of improved user fairness and it
provide more benefits compared to OMA. It is further proved that NOMA performs better than OMA in both
downlink and uplink by achieving the problem of joint maximization of the downlink/uplink rates while
taking fairness between users is satisfied [11]. In [12], the authors presented energy efficiency in wireless
powered NOMA networks and system performance is evaluated. In addition, recent works [13-22]
considered advantage of NOMA to implement in emerging networks. In particular, this paper develops
system based on results in [23-25]. More specifically, in this paper, we formulate the received signal at the
secondary user (SU) which can extract the data signal by using SINR or SNR. The outage probability (OP) of
the SU are analyzed in details in terms of probability of SINR and SNR. The results show that CR-NOMA
provide fairness to two users in term of OP.
2. SYSTEM MODEL
We assume that the system model with a downlink dual-hop underlay cognitive
radio–non-orthogonal multiple access (CR-NOMA) network shown in Figure 1, in which there are a primary
destination (PD) who is located in primary network (PN), a secondary source (BS), a relay (R) operating in
half-duplex mode and two destination users (U1; U2). The wireless channels follow Rayleigh fading-channel
𝑢 with channel gain 𝛺 𝑢. These channels assigned as in Figure 1 are h0, h1, g1 and g2, are independent and
identically distributed (i.i.d.) zero-mean complex Gaussian random variables (RVs). Single antenna is
assumed at each node. In this scenario, a perfect channel state information (CSI) is adopted.
As Figure 1, the distances between nodes are denoted by h0, h1, g1 and g2. In CR-NOMA, the BS make
interference to PD. It is noted that R requires decode-and-forward (DF) mode to forward signal to far users.
It is assumed that R is placed very far from the transmit primary source PD and hence it cannot interfere with
the primary network as shown in Figure 1. The power constraint for operations of both primary network and
secondary network is considered in this context.
BS
U2
g1 U1
g2
Secondary link
Interference link
R
PD
h1
h0
Secondary
network
Primary network
Figure 1. NOMA in cognitive radio network
The transmit power at secondary source is set based on constraint as above consideration
𝑃𝐵𝑆 ≤ 𝑚𝑖𝑛 (
𝐼
|ℎ0|2 , 𝑃̄ 𝐵𝑆) (1)
where 𝑃̄ 𝐵𝑆 and 𝐼 is denoted as the maximum average transmit power available at 𝐵𝑆 and interference
temperature constraint (ITC) at 𝑃𝐷, respectively. We call 𝑎1, 𝑎2as power allocation factors. In the first time
slot, R received the following signal
𝑦 𝑅( 𝑘) = ℎ1[√ 𝑃𝐵𝑆 𝑎1 𝑠1( 𝑘) + √ 𝑃𝐵𝑆 𝑎2 𝑠2( 𝑘)] + 𝑛 𝑅( 𝑘) (2)
where ℎ0~𝒞𝒩(0, 𝛺ℎ0), ℎ1~𝒞𝒩(0, 𝛺ℎ1), 𝑛 𝑅~𝒞𝒩(0, 𝜎 𝑅
2), it is assumed that 𝑎1 > 𝑎2nd 𝑎1 + 𝑎2 = 1.
By using NOMA, to detect signal s2 R decodes and removes s1 from the received signal. Therefore,
it need be determined the signal-to-interference-plus noise ratio (SINR) and signal-to-noise ratio (SNR) to
detect s1 and s2 at R as follows
𝛾 𝑅,𝑠1
=
𝜌 𝐵𝑆 𝑎1|ℎ1|2
𝜌 𝐵𝑆 𝑎2|ℎ1|2+1
(3)
3. TELKOMNIKA Telecommun Comput El Control
Study on outage performance gap of two destinations on CR-NOMA network (Hong-Nhu Nguyen)
193
where 𝜌 𝐵𝑆 =
𝑃 𝐵𝑆
𝜎 𝑅
2
𝛾 𝑅,𝑠2
= 𝜌 𝐵𝑆 𝑎2|ℎ1|2
(4)
Then, within the second slot, R forwards the detected superimposed signal
√ 𝑃𝑅 𝑎1 𝑠̃1( 𝑘) + √ 𝑃𝑅 𝑎2 𝑠̃2( 𝑘), where PR is the transmitted power at R, 𝑠̃1( 𝑘)and 𝑠̃2( 𝑘)are the detected and
forwarded data to the respective receivers. Therefore, Ui receives the following signal:
𝑦 𝑅𝑈 𝑖
( 𝑘) = 𝑔𝑖[√ 𝑃𝑅 𝑎1 𝑠̃1( 𝑘) + √ 𝑃𝑅 𝑎2 𝑠̃2( 𝑘)] + 𝑛 𝑅𝑈 𝑖
( 𝑘) (5)
where 𝑖 ∈ {1,2}, 𝑔𝑖~𝒞𝒩(0, 𝛺 𝑔𝑖) and 𝑛 𝑅~𝒞𝒩(0, 𝜎 𝑅𝐷 𝑖
2
). Furthermore, U2 implements SIC by detecting
𝑠̃1( 𝑘)while considering its own data 𝑠̃2( 𝑘)as a noise. The SINR of which can be written as:
𝛾 𝑅𝑈2,𝑠1
=
𝜌 𝑅 𝑎1|𝑔2|2
𝜌 𝑅 𝑎2|𝑔2|2+1
(6)
where 𝜌 𝑅 =
𝑃 𝑅
𝜎 𝑅𝐷 𝑖
2 . Then, by alleviate interference existing in (6) it can be detected the remaining signal.
Therefore, to detects its own signal at U2 , SNR is given by
𝛾 𝑅𝑈2,𝑠2
= 𝜌 𝑅 𝑎2|𝑔2|2
(7)
It is worth noting that U1 is allocated with higher power factor, s1 has higher priority to detect compared with
remaining signal, then SINR is expressed by
𝛾 𝑅𝑈1,𝑠1
=
𝜌 𝑅 𝑎1|𝑔1|2
𝜌 𝑅 𝑎2|𝑔1|2+1
(8)
3. PERFORMANCE ANALYSIS AND NUMERICAL RESULTS
3.1. Outage probability analysis at user 1
In this section, we examine the outage probability (OP) for s1 and s2. In [10-13], the OP of a signal is
defined as the probability that the achievable rate is below than a predefined rate threshold 𝑅𝑡ℎ𝑟, i.e.,
𝑃 𝑈1 = 𝑃𝑅[ 𝑅1 < 𝑅𝑡ℎ𝑟]. Therefore, the OP of s1 can be derived as:
( )( ) ( )1 1 1 1 1 1 1
1
, , 1 , 1 , 1
2 2
1 1 1 1
1 12 2 2
2 1 2 1 0
2 2
1 1 1 1
1 12 2 2 2
2 1 0 2 1 0
Pr min , 1 Pr ,
1 Pr , ,
1 1
Pr , ,
1
U R s RU s R s RU s
BS R I
BS
BS R
A
I R I
BS
I R
a h a g
a h a g h
a h a g
a h h a g h
= = −
= −
+ +
+
+ +
2A
(9)
where 𝜌𝐼 =
𝐼
𝜎 𝑃 𝐷
2 and 𝛾1 = 22𝑅1 − 1 is SNR related to interference and SNR related to target rate 𝑅1of user 𝑈1
respectively. Based on distribution functions of wireless channels, it can be expressed as:
( ) ( ) ( )2 2 2
1 1 0
1 1 0
2 2 2
1 1 1 0
0
Pr , ,
1
I
BS
BS R
I
BS h R g BS h
I
h g h
BS R BS
A h g h f x dx f y dy f z dz
e e
− − −
= =
= −
(10)
4. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 191 - 198
194
where 𝜓 =
𝛾1
(𝑎1−𝛾1 𝑎2)
. In similar way, it can be computed the second part of (9) as:
( ) ( ) ( )2 2 2
1 10
1 0 1 10 1
2
2 2 20
2 1 1 0
11
1
1 0 1 0
Pr , ,
1 1
I
R IS
I
g BS h I h R gh I h
I
R BS
I
g hh
yI R BS
x
y
I h
g h I h h
h
A h g h f x dx f y f z dydz
e dx e dy e
− − + −− +
= =
= =
+
(11)
by replacing (9) by (10) and (11), (9) can be re-expressed as:
𝒫𝑈1
= 1 − [𝑒
−
𝜓
𝜌̄ 𝐵𝑆 𝛺ℎ1
−
𝜓
𝜌 𝑅 (1 − 𝑒
−
𝜌 𝐼
𝜌̄ 𝐵𝑆 𝛺ℎ0) +
𝜌 𝐼 𝛺ℎ1
𝜌 𝐼 𝛺ℎ1+𝜓𝛺ℎ0
𝑒
−
𝜌 𝐼
𝜌̄ 𝐵𝑆
(
1
𝛺ℎ0
+
𝜓
𝜌 𝐼 𝛺ℎ1
)−
𝜓
𝜌 𝑅 𝛺 𝑔1] (12)
it is noted that the above formula is correct when𝑎1 > 𝛾1 𝑎2.
3.2. Outage probability analysis if perfect SIC at user 2
Similar to the signal s1, at user 𝑈1, the OP of the signal s2 can be expressed as:
( )( ) ( )2 2 2 2 2 2 2
1
2
, , 2 , 2 , 2
2 2
2 1 2 2 2 2 2
0
2
22 1
2 2 2 22 2
0 0
Pr min , 1 Pr ,
1 Pr , ,
Pr , ,
pSIC
U R x RU x R x RU x
I
BS R BS
B
I I
R BS
B
a h a g
h
a h
a g
h h
= = −
= −
+
(13)
where 𝛾2 = 22𝑅2 − 1 with 𝑅2 corresponding target rate of 𝑈2. The first part and the second part of (13) can
be further computed by:
( ) ( ) ( )
2 2
1 2 2 2 0
2 2 2
1 2 0
2 2
2 2
2 2 22 2
1 1 2 0
2 2
0
Pr , ,
1
I
IBS
BS h R g BS h
BS R
I
BS R BS
a a
h g h
a a
B h g h
a a
f x dx f y dy f z dz e e
− − −
=
= = −
(14)
then, other term can be given as:
( ) ( ) ( )2 2 2
2 10
2 2
2 2
22
2 0 1 20 1 2
2
2
2
2 2 22 0 2
2 1 2 0
2 2
11
1 2
2 0 1 2 2 0
Pr , ,
1 1
I
R BS I
I
g BS h I hh I h
I
R BS
I
g hh
yI R BS
a a
x
y
aa I h
g h I h h
a
h
B h g h f x dx f y f z dydz
a a
a
e dx e dy e
a
− − +− +
= =
= =
+
2
2 2R g a
−
(15)
by substituting (15) and (14) into (13), (13) can be rewritten as:
5. TELKOMNIKA Telecommun Comput El Control
Study on outage performance gap of two destinations on CR-NOMA network (Hong-Nhu Nguyen)
195
𝒫𝑈2
𝑝𝑆𝐼𝐶
= 1 − [𝑒
−
𝛾2
𝜌̄ 𝐵𝑆 𝛺ℎ1 𝑎2
−
𝛾2
𝜌 𝑅 𝛺 𝑔2 𝑎2 (1 − 𝑒
−
𝜌 𝐼
𝜌̄ 𝐵𝑆 𝛺ℎ0) +
𝜌𝐼 𝛺ℎ1 𝑎2
𝜌𝐼 𝛺ℎ1 𝑎2+𝛾2 𝛺ℎ0
𝑒
−
𝜌 𝐼
𝜌̄ 𝐵𝑆
(
1
𝛺ℎ0
+
𝛾2
𝜌 𝐼 𝛺ℎ1 𝑎2
)−
𝛾2
𝜌 𝑅 𝛺 𝑔2 𝑎2] (16)
3.3. Outage analysis if imperfect SIC at user 2
The SINR and signal-to-noise ratio (SNR) of decoding s2 at R and at destination 𝑈2 can be
respectively written as:
𝛾 𝑅,𝑠2
=
𝜌 𝐵𝑆 𝑎2|ℎ1|2
𝜌 𝐵𝑆|𝑓1|2+1
(17)
𝛾 𝑅𝑈2,𝑠2
=
𝜌 𝑅 𝑎2|𝑔2|2
𝜌 𝑅|𝑓2|2+1
(18)
then, the OP in case of imperfect SIC at 𝑈2can be calculated by:
( )( )
( )
2 2 2 2
2 2 2
1
, , 2
, 2 , 2
2 2
2 1 2 2
2 22 2 2
1 2 0
2 2
2 1 2 2
2 22 2 2 2
1 0 2 0
Pr min ,
1 Pr ,
1 Pr , ,
1 1
Pr , ,
1
ipSIC
U R x RD x
R x RD x
BS R I
BS
BS R
C
I R I
BS
I R
a h a g
f f h
a h a g
f h f h
=
= −
= −
+ +
+
+ +
2C
(19)
similarly, (19) can be rewritten as:
( )
2 2
1 2 2 20
2
2 2
0 2 2 2
11
2 1 2 2
1 2 2 2
11
12 10 2
2 2 2 2 2 2
2 2
1 1 1 1
1 1
I
h BS R gBS h
I
BS h BS R g
a a f fipSIC
U
h g
a afh
f R R g R g
I
e e
a a
a a e
a a
−−
− −−
−−
− − −−
= − − + +
+ + + +
(20)
3.4. Asymptotic analysis
This part provides approximate performance as extra insights in our conisdered system.
When 𝜌 → ∞, it can be applied 𝑒−𝑥
≈ 1 − 𝑥, then approximate performance can be archived as below.
The approximate OP of user 𝑈1can be given by:
𝒫𝑎𝑠𝑦𝑚,𝑈1
∞
= 1 − [(1 −
𝜓
𝜌̄ 𝐵𝑆 𝛺ℎ1
−
𝜓
𝜌 𝑅
)
𝜌 𝐼
𝜌̄ 𝐵𝑆 𝛺ℎ0
+
𝜌 𝐼 𝛺ℎ1
𝜌 𝐼 𝛺ℎ1+𝜓𝛺ℎ0
(1 −
𝜌 𝐼
𝛺ℎ0 𝜌̄ 𝐵𝑆
−
𝜓𝜌 𝐼
𝜌 𝐼 𝜌̄ 𝐵𝑆 𝛺ℎ1
−
𝜓
𝜌 𝑅 𝛺 𝑔1
)] (21)
the approximate OP of user 𝑈2in case of perfect SIC can be given by:
2
, 2 2
,
1 2 2 2 0
1 2 2 2
1 2 2 0 0 1 2 2 2
1 1
1
pSIC I
asym U
BS h R g BS h
I h I I
I h h h BS I BS h R g
a a
a
a a a
= − − −
+ − − − +
(22)
6. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 191 - 198
196
the approximate OP of user 𝑈2in case of imperfect SIC can be formulated by:
( )
2
11
2 1 2 2, 2 2
,
0 1 2 2 2 1 2 2 2
11
12 10 2
2 2 2 2
2 2
2 2
2 2
0 2 2 2
1 1 1 1
1 1
1
f fipSIC I
asym U
BS h h BS R g h g
fh
f R R g
I
I
R g
BS h BS R g
a a a a
a
a a
a
a a
−−
−−
−
= − − − + +
+ + + +
− − −
(23)
3.5. Throughput
In term of throughput, each user can be shown throughput performance as:
𝜏 𝑈⋆
= (1 − 𝒫 𝑈⋆
)𝑅⋆ (24)
where ⋆∈ {1,2}.
4. NUMERICAL RESULTS
In this section, we evaluate the performance of CR-NOMA, we set power allocation factors
𝑎1 = 0.8 and 𝑎2 = 0.2, the target rate is set to be 𝑅1 = 1 and 𝑅2 = 1.5, the channel gains 𝛺ℎ0 = 1, 𝛺ℎ1 = 1,
𝛺 𝑔1 = 1, 𝛺 𝑔2 = 0.4, 𝛺𝑓1 = 𝛺𝑓2 = 0.001. Interference between PN and SNR is 𝜌𝐼 = 40 𝑑𝐵. Figure 2 and
Figure 3 plot the OP of two secondary destinations, as varying interference level 𝜌𝐼 and power allocation
factor, transmit SNR. Outage performance of 𝑈1 is better than that of 𝑈2. It can be seen that when higher
transmit SNR is required, outage performance will be improved significantly at considered range of SNR and
OP meets saturation trend as SNR is from 50 (dB) to 60 (dB).
The asymptotic curves match with the analytical curves very well at high SNR. This output confirms
exact approximate expressions of outage probability archived for two users. It is intuitively seen that no ITC
case exhibits lowest performance since no harmful interference from the PN exists. It can be seen
performance gap of these cases with different data rate is small, it exhibit acceptance performance for such
NOMA with acceptable small value of target rate. In addition, Monte-Carlo simulation results match with
analytical results very well in whole range of SNR. Figure 4 proved that higher rate result in worst case of
outage performance. In addition, as observation from Figure 5, throughput is high at high SNR and high 𝜌𝐼.
Figure 2. Outage performance
versus SNR at secondary source
Figure 3. Impact of ITC on outage performance
versus SNR at secondary source
7. TELKOMNIKA Telecommun Comput El Control
Study on outage performance gap of two destinations on CR-NOMA network (Hong-Nhu Nguyen)
197
Figure 4. Outage performance versus target
rates,with 𝜌𝐼 = 20 ( 𝑑𝐵), 𝑎1 = 0.9and 𝑎2 = 0.1
Figure 5. Throughput performance
5. CONCLUSION
In this paper, CR-NOMA networks over Rayleigh fading channels is studied by exploring
the end-to-end closed-form expressions to indicate outage performance . To compare the outage performance
of two secondary destinations, we derived expressions of outage probability and then numerical results are
provided performance comparisons of two users in CR-NOMA network. As main result, the fairness of two
users is satisfied as in numerical results by the proper selection of power allocation factors. Other condition is
that interference to primary network can be constrained. Moreover, comparison results of the outage behavior
showed that 𝑈1 performs better than 𝑈2 in considered scenarios. Finally, in the future work, we will consider
multiple users who operate in manner of CR-NOMA network.
ACKNOWLEDGEMENTS
The authors would like to thank the anonymous reviews for the helpful comments and
suggestions.This work is a part of the basic science research program CS2019-42 funded by the Saigon
University. Correspondence should be addressed to Dinh-Thuan Do (dodinhthuan@iuh.edu.vn).
REFERENCES
[1] Federal Communications Commisions, “Facilitating opportunities for flexible, efficient, and reliable spectrum use
employing cognitive radio technologies,” Washington, DC, USA, Tech. Rep. FCC 02-155, [Online], Available:
https://www.fcc.gov/document/facilitating-opportunities-flexible-efficient-and-reliable-spectrum-1, 2003.
[2] J. Mitola and G. Q. Maguire, "Cognitive radio: making software radios more personal," in IEEE Personal
Communications, vol. 6, no. 4, pp. 13-18, Aug 1999.
[3] F. Zhou, N. C. Beaulieu, Z. Li, J. Si and P. Qi, "Energy-Efficient Optimal Power Allocation for Fading Cognitive
Radio Channels: Ergodic Capacity, Outage Capacity, and Minimum-Rate Capacity," IEEE Transactions on
Wireless Communications, vol. 15, no. 4, pp. 2741-2755, April 2016.
[4] N. Zhao, F. R. Yu, H. Sun and M. Li, "Adaptive Power Allocation Schemes for Spectrum Sharing in
Interference-Alignment-Based Cognitive Radio Networks," IEEE Transactions on Vehicular Technology,
vol. 65, no. 5, pp. 3700-3714, May 2016.
[5] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan and V. K. Bhargava, "A Survey on Non-Orthogonal
Multiple Access for 5G Networks: Research Challenges and Future Trends," IEEE Journal on Selected Areas in
Communications, vol. 35, no. 10, pp. 2181-2195, Oct 2017.
[6] T. L. Nguyen and Dinh-Thuan Do, "Exploiting Impacts of Intercell Interference on SWIPT-Assisted
Non-Orthogonal Multiple Access," Wireless Communications and Mobile Computing, vol. 2018, pp. 1-12,
Article ID 2525492, November 2018.
[7] L. Dai, B. Wang, Y. Yuan, S. Han, C. I and Z. Wang, "Non-orthogonal multiple access for 5G: solutions,
challenges, opportunities, and future research trends," IEEE Communications Magazine, vol. 53, no. 9,
pp. 74-81, September 2015.
[8] S. M. R. Islam, N. Avazov, O. A. Dobre, and K.-S. Kwak, “Power-Domain Non-Orthogonal Multiple Access
(NOMA) in 5G Systems: Potentials and Challenges,” IEEE Commun. Surveys & Tutorials, vol. 19, no. 2,
pp. 721–742, 2017.
8. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 191 - 198
198
[9] H. Chingoska, Z. Hadzi-Velkov, I. Nikoloska and N. Zlatanov, “Resource Allocation in Wireless Powered
Communication Networks with Non-Orthogonal Multiple Access,” IEEE Wireless Communications Letters, vol. 5,
no. 6, pp. 684-687, Dec 2016.
[10] P. D. Diamantoulakis, K. N. Pappi, Z. Ding and G. K. Karagiannidis, “Wireless-Powered Communications with
Non-Orthogonal Multiple Access,” IEEE Transactions on Wireless Communications, vol. 15, no. 12,
pp. 8422-8436, Dec 2016.
[11] P. D. Diamantoulakis, K. N. Pappi, G. K. Karagiannidis, H. Xing and A. Nallanathan, “Joint Downlink/Uplink
Design for Wireless Powered Networks with Interference,” IEEE Access, vol. 5, pp. 1534-1547, 2017.
[12] Dinh-Thuan Do and Chi-Bao Le, “Application of NOMA in Wireless System with Wireless Power Transfer
Scheme: Outage and Ergodic Capacity Performance Analysis,” Sensors, vol. 18, no. 10, 2018.
[13] Dinh-Thuan Do and M. S. Van Nguyen, “Device-to-device transmission modes in NOMA network with and
without Wireless Power Transfer,” Computer Communications, vol. 139, No. 1, pp. 67-77, May 2019.
[14] D. Do, M. Vaezi and T. Nguyen, “Wireless Powered Cooperative Relaying Using NOMA with Imperfect CSI,”
2018 IEEE Globecom Workshops, Abu Dhabi, United Arab Emirates, pp. 1-6, 2018.
[15] D. T. Do and A. T. Le, “NOMA based cognitive relaying: Transceiver hardware impairments, relay selection
policies and outage performance comparison,” Computer Communications, vol. 146, pp. 144-154, May 2019.
[16] Dinh-Thuan Do, Chi-Bao Le, A. T. Le, “Cooperative underlay cognitive radio assisted NOMA: secondary network
improvement and outage performance,” TELKOMNIKA Telecommunication Computing Electronics and Control,
vol. 17, no. 5, pp. 2147-2154, October 2019.
[17] Dinh-Thuan Do, T. T. Thi Nguyen, “Exact Outage Performance Analysis of Amplify-and Forward-Aware
Cooperative NOMA,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 16, no. 5,
pp. 1966-1973, October 2018.
[18] D. T. Do et al. “Wireless power transfer enabled NOMA relay systems: two SIC modes and performance
evaluation,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 17, no. 6, pp. 2697-2703,
December 2019.
[19] Thanh-Luan Nguyen and Dinh-Thuan Do, “Power Allocation Schemes for Wireless Powered NOMA Systems with
Imperfect CSI: System model and performance analysis,” International Journal of Communication Systems,
vol. 31, no. 10, August 2018.
[20] D. T. Do, A. T. Le and B. M. Lee, “On Performance Analysis of Underlay Cognitive Radio-Aware Hybrid
OMA/NOMA Networks with Imperfect CSI,” Electronics, vol. 8, no. 7, July 2019.
[21] D. T. Do, A. T. Le, C. B. Le and B. M. Lee “On Exact Outage and Throughput Performance of Cognitive Radio
based Non-Orthogonal Multiple Access Networks with and Without D2D Link,” Sensors, vol. 19, July 2019.
[22] D. T. Do, M. S. Van Nguyen, T. A. Hoang, B.-M. Lee, “Exploiting Joint Base Station Equipped Multiple Antenna
and Full-Duplex D2D Users in Power Domain Division Based Multiple Access Networks,” Sensors, vol. 19,
no. 11, May 2019.
[23] D. T. Do, M. S. V. Nguyen, T. A. Hoang and M. Voznak, “NOMA-Assisted Multiple Access Scheme for IoT
Deployment: Relay Selection Model and Secrecy Performance Improvement,” Sensors, vol. 19, no. 3, Feb 2019.
[24] G. Nauryzbayev, S. Arzykulov, T. A. Tsiftsis and M. Abdallah, “Performance of Cooperative Underlay CR-NOMA
Networks over Nakagami-m Channels,” 2018 IEEE International Conference on Communications Workshops
(ICC Workshops), pp. 1-6, 2018.
[25] G. Im and J. H. Lee, “Outage Probability for Cooperative NOMA Systems with Imperfect SIC in Cognitive Radio
Networks,” in IEEE Communications Letters, vol. 23, no. 4, pp. 692-695, April 2019.