SlideShare a Scribd company logo
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 1, February 2020, pp. 191~198
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i1.13271  191
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Study on outage performance gap of two destinations on
CR-NOMA network
Hong-Nhu Nguyen1
, Chi-Bao Le2
, Nhat-Tien Nguyen3
, Dinh-Thuan Do4
1,3
Faculty of Electronics and Telecommunications, Saigon University, Ho Chi Minh City, Vietnam
2,4
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh City, Vietnam
Article Info ABSTRACT
Article history:
Received Jun 2, 2019
Revised Nov 11, 2019
Accepted Nov 30, 2019
Non-orthogonal multiple access (NOMA) and cognitive radio (CR) are
promising to overcome spectral scarcity problem encountered in applications
implementations in wireless communication. Especially, massive
connectivity in such network is strict requirement in network deployment.
This study aims to improve spectral efficiency at two secondary destinations
by investigating a CR-NOMA network under situation of the perfect
successive interference cancellation (SIC). We also derive the exact outage
probability for secondary users. Furthermore, an approximate computation
method is applied to indicate more insights. It is confirmed that
the performance achieved together with performance gap among two users
can be obtained due to different power allocation factors assigned to users.
Keywords:
Cognitive radio
Non-orthogonal multiple access
SIC
This is an open access article under the CC BY-SA license.
Corresponding Author:
Dinh-Thuan Do,
Faculty of Electronics Technology,
Industrial University of Ho Chi Minh City (IUH),
Ho Chi Minh City, Vietnam.
Email: dodinhthuan@iuh.edu.vn
1. INTRODUCTION
The spectral efficient and energy-efficient requirements are necessary to satisfy the explosive
increase of mobile user in wireless system with high-rate services. However, high spectral efficiency (SE)
cannot be achieved since the fixed spectrum allocation strategy is adopted. Unfortunately, 30 percentages of
the licensed spectrum in the United States is fully occupied as the report from the Federal Communications
Commission [1]. By allowing the primary network to share its frequency band with the secondary network,
cognitive radio (CR) has been studied and hence SE improvement achieved [2]. In principle of CR, spectrum
sharing paradigm permits the secondary users (SUs) to operate together with the primary users (PUs) at the
same band and power constraint must be obeyed to limit interference impact caused by the PUs [3, 4].
Several techniques such as cellular networks, relay networks, and wireless sensor networks, benefit from
implementation of CR to provide the potential SE improvement.
To further provide massive connectivity, more advantages can be achieved by employing multiple
access for mobile users. In particular, the network allocates resource to users by dividing the total radio
resources with two underlying techniques, i.e. orthogonal multiple access (OMA) and non-orthogonal
multiple access (NOMA). The interference can be eliminated in OMA scheme while NOMA employs
successive interference cancellation (SIC) technique to alleviate interference from other users’ signal [5]. By
exploiting the users’ channel asymmetry, NOMA can remarkably enhance the SE and then the transmission
latency can be reduced [5-8]. The authors in [9] showed that the achievable rate region in the uplink NOMA
is improved in comparison with OMA and such analysis is adopted in wireless powered communication
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 191 - 198
192
(WPC) networks. In [10], main results reported that NOMA with advantage of improved user fairness and it
provide more benefits compared to OMA. It is further proved that NOMA performs better than OMA in both
downlink and uplink by achieving the problem of joint maximization of the downlink/uplink rates while
taking fairness between users is satisfied [11]. In [12], the authors presented energy efficiency in wireless
powered NOMA networks and system performance is evaluated. In addition, recent works [13-22]
considered advantage of NOMA to implement in emerging networks. In particular, this paper develops
system based on results in [23-25]. More specifically, in this paper, we formulate the received signal at the
secondary user (SU) which can extract the data signal by using SINR or SNR. The outage probability (OP) of
the SU are analyzed in details in terms of probability of SINR and SNR. The results show that CR-NOMA
provide fairness to two users in term of OP.
2. SYSTEM MODEL
We assume that the system model with a downlink dual-hop underlay cognitive
radio–non-orthogonal multiple access (CR-NOMA) network shown in Figure 1, in which there are a primary
destination (PD) who is located in primary network (PN), a secondary source (BS), a relay (R) operating in
half-duplex mode and two destination users (U1; U2). The wireless channels follow Rayleigh fading-channel
𝑢 with channel gain 𝛺 𝑢. These channels assigned as in Figure 1 are h0, h1, g1 and g2, are independent and
identically distributed (i.i.d.) zero-mean complex Gaussian random variables (RVs). Single antenna is
assumed at each node. In this scenario, a perfect channel state information (CSI) is adopted.
As Figure 1, the distances between nodes are denoted by h0, h1, g1 and g2. In CR-NOMA, the BS make
interference to PD. It is noted that R requires decode-and-forward (DF) mode to forward signal to far users.
It is assumed that R is placed very far from the transmit primary source PD and hence it cannot interfere with
the primary network as shown in Figure 1. The power constraint for operations of both primary network and
secondary network is considered in this context.
BS
U2
g1 U1
g2
Secondary link
Interference link
R
PD
h1
h0
Secondary
network
Primary network
Figure 1. NOMA in cognitive radio network
The transmit power at secondary source is set based on constraint as above consideration
𝑃𝐵𝑆 ≤ 𝑚𝑖𝑛 (
𝐼
|ℎ0|2 , 𝑃̄ 𝐵𝑆) (1)
where 𝑃̄ 𝐵𝑆 and 𝐼 is denoted as the maximum average transmit power available at 𝐵𝑆 and interference
temperature constraint (ITC) at 𝑃𝐷, respectively. We call 𝑎1, 𝑎2as power allocation factors. In the first time
slot, R received the following signal
𝑦 𝑅( 𝑘) = ℎ1[√ 𝑃𝐵𝑆 𝑎1 𝑠1( 𝑘) + √ 𝑃𝐵𝑆 𝑎2 𝑠2( 𝑘)] + 𝑛 𝑅( 𝑘) (2)
where ℎ0~𝒞𝒩(0, 𝛺ℎ0), ℎ1~𝒞𝒩(0, 𝛺ℎ1), 𝑛 𝑅~𝒞𝒩(0, 𝜎 𝑅
2), it is assumed that 𝑎1 > 𝑎2nd 𝑎1 + 𝑎2 = 1.
By using NOMA, to detect signal s2 R decodes and removes s1 from the received signal. Therefore,
it need be determined the signal-to-interference-plus noise ratio (SINR) and signal-to-noise ratio (SNR) to
detect s1 and s2 at R as follows
𝛾 𝑅,𝑠1
=
𝜌 𝐵𝑆 𝑎1|ℎ1|2
𝜌 𝐵𝑆 𝑎2|ℎ1|2+1
(3)
TELKOMNIKA Telecommun Comput El Control 
Study on outage performance gap of two destinations on CR-NOMA network (Hong-Nhu Nguyen)
193
where 𝜌 𝐵𝑆 =
𝑃 𝐵𝑆
𝜎 𝑅
2
𝛾 𝑅,𝑠2
= 𝜌 𝐵𝑆 𝑎2|ℎ1|2
(4)
Then, within the second slot, R forwards the detected superimposed signal
√ 𝑃𝑅 𝑎1 𝑠̃1( 𝑘) + √ 𝑃𝑅 𝑎2 𝑠̃2( 𝑘), where PR is the transmitted power at R, 𝑠̃1( 𝑘)and 𝑠̃2( 𝑘)are the detected and
forwarded data to the respective receivers. Therefore, Ui receives the following signal:
𝑦 𝑅𝑈 𝑖
( 𝑘) = 𝑔𝑖[√ 𝑃𝑅 𝑎1 𝑠̃1( 𝑘) + √ 𝑃𝑅 𝑎2 𝑠̃2( 𝑘)] + 𝑛 𝑅𝑈 𝑖
( 𝑘) (5)
where 𝑖 ∈ {1,2}, 𝑔𝑖~𝒞𝒩(0, 𝛺 𝑔𝑖) and 𝑛 𝑅~𝒞𝒩(0, 𝜎 𝑅𝐷 𝑖
2
). Furthermore, U2 implements SIC by detecting
𝑠̃1( 𝑘)while considering its own data 𝑠̃2( 𝑘)as a noise. The SINR of which can be written as:
𝛾 𝑅𝑈2,𝑠1
=
𝜌 𝑅 𝑎1|𝑔2|2
𝜌 𝑅 𝑎2|𝑔2|2+1
(6)
where 𝜌 𝑅 =
𝑃 𝑅
𝜎 𝑅𝐷 𝑖
2 . Then, by alleviate interference existing in (6) it can be detected the remaining signal.
Therefore, to detects its own signal at U2 , SNR is given by
𝛾 𝑅𝑈2,𝑠2
= 𝜌 𝑅 𝑎2|𝑔2|2
(7)
It is worth noting that U1 is allocated with higher power factor, s1 has higher priority to detect compared with
remaining signal, then SINR is expressed by
𝛾 𝑅𝑈1,𝑠1
=
𝜌 𝑅 𝑎1|𝑔1|2
𝜌 𝑅 𝑎2|𝑔1|2+1
(8)
3. PERFORMANCE ANALYSIS AND NUMERICAL RESULTS
3.1. Outage probability analysis at user 1
In this section, we examine the outage probability (OP) for s1 and s2. In [10-13], the OP of a signal is
defined as the probability that the achievable rate is below than a predefined rate threshold 𝑅𝑡ℎ𝑟, i.e.,
𝑃 𝑈1 = 𝑃𝑅[ 𝑅1 < 𝑅𝑡ℎ𝑟]. Therefore, the OP of s1 can be derived as:
( )( ) ( )1 1 1 1 1 1 1
1
, , 1 , 1 , 1
2 2
1 1 1 1
1 12 2 2
2 1 2 1 0
2 2
1 1 1 1
1 12 2 2 2
2 1 0 2 1 0
Pr min , 1 Pr ,
1 Pr , ,
1 1
Pr , ,
1
U R s RU s R s RU s
BS R I
BS
BS R
A
I R I
BS
I R
a h a g
a h a g h
a h a g
a h h a g h
      
  
  
 
  
  
 
=  = −  

  
  = −   
  + + 


+   
+ +
2A


 
 


(9)
where 𝜌𝐼 =
𝐼
𝜎 𝑃 𝐷
2 and 𝛾1 = 22𝑅1 − 1 is SNR related to interference and SNR related to target rate 𝑅1of user 𝑈1
respectively. Based on distribution functions of wireless channels, it can be expressed as:
( ) ( ) ( )2 2 2
1 1 0
1 1 0
2 2 2
1 1 1 0
0
Pr , ,
1
I
BS
BS R
I
BS h R g BS h
I
h g h
BS R BS
A h g h f x dx f y dy f z dz
e e


 
 
  
  
 
  
 
− − −
  
 
=    = 
 
 
=  − 
 
 
  
(10)
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 191 - 198
194
where 𝜓 =
𝛾1
(𝑎1−𝛾1 𝑎2)
. In similar way, it can be computed the second part of (9) as:
( ) ( ) ( )2 2 2
1 10
1 0 1 10 1
2
2 2 20
2 1 1 0
11
1
1 0 1 0
Pr , ,
1 1
I
R IS
I
g BS h I h R gh I h
I
R BS
I
g hh
yI R BS
x
y
I h
g h I h h
h
A h g h f x dx f y f z dydz
e dx e dy e
  
 
  
  
 
 
 
  

 
  
   − − + −− +             
 
 =    =
 
 

= =
   + 
  
 
(11)
by replacing (9) by (10) and (11), (9) can be re-expressed as:
𝒫𝑈1
= 1 − [𝑒
−
𝜓
𝜌̄ 𝐵𝑆 𝛺ℎ1
−
𝜓
𝜌 𝑅 (1 − 𝑒
−
𝜌 𝐼
𝜌̄ 𝐵𝑆 𝛺ℎ0) +
𝜌 𝐼 𝛺ℎ1
𝜌 𝐼 𝛺ℎ1+𝜓𝛺ℎ0
𝑒
−
𝜌 𝐼
𝜌̄ 𝐵𝑆
(
1
𝛺ℎ0
+
𝜓
𝜌 𝐼 𝛺ℎ1
)−
𝜓
𝜌 𝑅 𝛺 𝑔1] (12)
it is noted that the above formula is correct when𝑎1 > 𝛾1 𝑎2.
3.2. Outage probability analysis if perfect SIC at user 2
Similar to the signal s1, at user 𝑈1, the OP of the signal s2 can be expressed as:
( )( ) ( )2 2 2 2 2 2 2
1
2
, , 2 , 2 , 2
2 2
2 1 2 2 2 2 2
0
2
22 1
2 2 2 22 2
0 0
Pr min , 1 Pr ,
1 Pr , ,
Pr , ,
pSIC
U R x RU x R x RU x
I
BS R BS
B
I I
R BS
B
a h a g
h
a h
a g
h h
      

    
 
   
=  = −  

  
  = −   
  
 


 
 +   
 
 


(13)
where 𝛾2 = 22𝑅2 − 1 with 𝑅2 corresponding target rate of 𝑈2. The first part and the second part of (13) can
be further computed by:
( ) ( ) ( )
2 2
1 2 2 2 0
2 2 2
1 2 0
2 2
2 2
2 2 22 2
1 1 2 0
2 2
0
Pr , ,
1
I
IBS
BS h R g BS h
BS R
I
BS R BS
a a
h g h
a a
B h g h
a a
f x dx f y dy f z dz e e

  
  
 
 
  
  
  − − −
  
 
=    
 
 
= =  − 
 
 
  
(14)
then, other term can be given as:
( ) ( ) ( )2 2 2
2 10
2 2
2 2
22
2 0 1 20 1 2
2
2
2
2 2 22 0 2
2 1 2 0
2 2
11
1 2
2 0 1 2 2 0
Pr , ,
1 1
I
R BS I
I
g BS h I hh I h
I
R BS
I
g hh
yI R BS
a a
x
y
aa I h
g h I h h
a
h
B h g h f x dx f y f z dydz
a a
a
e dx e dy e
a
  
  
 
 
 
 
  
  

 
  
   − − +− +          
 
 =    =
 
 

= =
   + 
  
 
2
2 2R g a


− 
(15)
by substituting (15) and (14) into (13), (13) can be rewritten as:
TELKOMNIKA Telecommun Comput El Control 
Study on outage performance gap of two destinations on CR-NOMA network (Hong-Nhu Nguyen)
195
𝒫𝑈2
𝑝𝑆𝐼𝐶
= 1 − [𝑒
−
𝛾2
𝜌̄ 𝐵𝑆 𝛺ℎ1 𝑎2
−
𝛾2
𝜌 𝑅 𝛺 𝑔2 𝑎2 (1 − 𝑒
−
𝜌 𝐼
𝜌̄ 𝐵𝑆 𝛺ℎ0) +
𝜌𝐼 𝛺ℎ1 𝑎2
𝜌𝐼 𝛺ℎ1 𝑎2+𝛾2 𝛺ℎ0
𝑒
−
𝜌 𝐼
𝜌̄ 𝐵𝑆
(
1
𝛺ℎ0
+
𝛾2
𝜌 𝐼 𝛺ℎ1 𝑎2
)−
𝛾2
𝜌 𝑅 𝛺 𝑔2 𝑎2] (16)
3.3. Outage analysis if imperfect SIC at user 2
The SINR and signal-to-noise ratio (SNR) of decoding s2 at R and at destination 𝑈2 can be
respectively written as:
𝛾 𝑅,𝑠2
=
𝜌 𝐵𝑆 𝑎2|ℎ1|2
𝜌 𝐵𝑆|𝑓1|2+1
(17)
𝛾 𝑅𝑈2,𝑠2
=
𝜌 𝑅 𝑎2|𝑔2|2
𝜌 𝑅|𝑓2|2+1
(18)
then, the OP in case of imperfect SIC at 𝑈2can be calculated by:
( )( )
( )
2 2 2 2
2 2 2
1
, , 2
, 2 , 2
2 2
2 1 2 2
2 22 2 2
1 2 0
2 2
2 1 2 2
2 22 2 2 2
1 0 2 0
Pr min ,
1 Pr ,
1 Pr , ,
1 1
Pr , ,
1
ipSIC
U R x RD x
R x RD x
BS R I
BS
BS R
C
I R I
BS
I R
a h a g
f f h
a h a g
f h f h
  
   
  
  
 
  
  
 
= 
= −  

  
  = −   
  + + 

 
 +   
 + + 
2C






(19)
similarly, (19) can be rewritten as:
( )
2 2
1 2 2 20
2
2 2
0 2 2 2
11
2 1 2 2
1 2 2 2
11
12 10 2
2 2 2 2 2 2
2 2
1 1 1 1
1 1
I
h BS R gBS h
I
BS h BS R g
a a f fipSIC
U
h g
a afh
f R R g R g
I
e e
a a
a a e
a a
 
 
  
  
 

   

−−
− −−
 
−−
− − −−  
     
= −  −  + +            
  
+ + +  +    
    
(20)
3.4. Asymptotic analysis
This part provides approximate performance as extra insights in our conisdered system.
When 𝜌 → ∞, it can be applied 𝑒−𝑥
≈ 1 − 𝑥, then approximate performance can be archived as below.
The approximate OP of user 𝑈1can be given by:
𝒫𝑎𝑠𝑦𝑚,𝑈1
∞
= 1 − [(1 −
𝜓
𝜌̄ 𝐵𝑆 𝛺ℎ1
−
𝜓
𝜌 𝑅
)
𝜌 𝐼
𝜌̄ 𝐵𝑆 𝛺ℎ0
+
𝜌 𝐼 𝛺ℎ1
𝜌 𝐼 𝛺ℎ1+𝜓𝛺ℎ0
(1 −
𝜌 𝐼
𝛺ℎ0 𝜌̄ 𝐵𝑆
−
𝜓𝜌 𝐼
𝜌 𝐼 𝜌̄ 𝐵𝑆 𝛺ℎ1
−
𝜓
𝜌 𝑅 𝛺 𝑔1
)] (21)
the approximate OP of user 𝑈2in case of perfect SIC can be given by:
2
, 2 2
,
1 2 2 2 0
1 2 2 2
1 2 2 0 0 1 2 2 2
1 1
1
pSIC I
asym U
BS h R g BS h
I h I I
I h h h BS I BS h R g
a a
a
a a a
  
  
    
     

 
= − − −     
 
+ − − −    +      
(22)
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 191 - 198
196
the approximate OP of user 𝑈2in case of imperfect SIC can be formulated by:
( )
2
11
2 1 2 2, 2 2
,
0 1 2 2 2 1 2 2 2
11
12 10 2
2 2 2 2
2 2
2 2
2 2
0 2 2 2
1 1 1 1
1 1
1
f fipSIC I
asym U
BS h h BS R g h g
fh
f R R g
I
I
R g
BS h BS R g
a a a a
a
a a
a
a a
   
  

  

  

  
−−

−−
−
      
= − − − + +                
  
+ + +  +   
   
 
  − − −    



(23)
3.5. Throughput
In term of throughput, each user can be shown throughput performance as:
𝜏 𝑈⋆
= (1 − 𝒫 𝑈⋆
)𝑅⋆ (24)
where ⋆∈ {1,2}.
4. NUMERICAL RESULTS
In this section, we evaluate the performance of CR-NOMA, we set power allocation factors
𝑎1 = 0.8 and 𝑎2 = 0.2, the target rate is set to be 𝑅1 = 1 and 𝑅2 = 1.5, the channel gains 𝛺ℎ0 = 1, 𝛺ℎ1 = 1,
𝛺 𝑔1 = 1, 𝛺 𝑔2 = 0.4, 𝛺𝑓1 = 𝛺𝑓2 = 0.001. Interference between PN and SNR is 𝜌𝐼 = 40 𝑑𝐵. Figure 2 and
Figure 3 plot the OP of two secondary destinations, as varying interference level 𝜌𝐼 and power allocation
factor, transmit SNR. Outage performance of 𝑈1 is better than that of 𝑈2. It can be seen that when higher
transmit SNR is required, outage performance will be improved significantly at considered range of SNR and
OP meets saturation trend as SNR is from 50 (dB) to 60 (dB).
The asymptotic curves match with the analytical curves very well at high SNR. This output confirms
exact approximate expressions of outage probability archived for two users. It is intuitively seen that no ITC
case exhibits lowest performance since no harmful interference from the PN exists. It can be seen
performance gap of these cases with different data rate is small, it exhibit acceptance performance for such
NOMA with acceptable small value of target rate. In addition, Monte-Carlo simulation results match with
analytical results very well in whole range of SNR. Figure 4 proved that higher rate result in worst case of
outage performance. In addition, as observation from Figure 5, throughput is high at high SNR and high 𝜌𝐼.
Figure 2. Outage performance
versus SNR at secondary source
Figure 3. Impact of ITC on outage performance
versus SNR at secondary source
TELKOMNIKA Telecommun Comput El Control 
Study on outage performance gap of two destinations on CR-NOMA network (Hong-Nhu Nguyen)
197
Figure 4. Outage performance versus target
rates,with 𝜌𝐼 = 20 ( 𝑑𝐵), 𝑎1 = 0.9and 𝑎2 = 0.1
Figure 5. Throughput performance
5. CONCLUSION
In this paper, CR-NOMA networks over Rayleigh fading channels is studied by exploring
the end-to-end closed-form expressions to indicate outage performance . To compare the outage performance
of two secondary destinations, we derived expressions of outage probability and then numerical results are
provided performance comparisons of two users in CR-NOMA network. As main result, the fairness of two
users is satisfied as in numerical results by the proper selection of power allocation factors. Other condition is
that interference to primary network can be constrained. Moreover, comparison results of the outage behavior
showed that 𝑈1 performs better than 𝑈2 in considered scenarios. Finally, in the future work, we will consider
multiple users who operate in manner of CR-NOMA network.
ACKNOWLEDGEMENTS
The authors would like to thank the anonymous reviews for the helpful comments and
suggestions.This work is a part of the basic science research program CS2019-42 funded by the Saigon
University. Correspondence should be addressed to Dinh-Thuan Do (dodinhthuan@iuh.edu.vn).
REFERENCES
[1] Federal Communications Commisions, “Facilitating opportunities for flexible, efficient, and reliable spectrum use
employing cognitive radio technologies,” Washington, DC, USA, Tech. Rep. FCC 02-155, [Online], Available:
https://www.fcc.gov/document/facilitating-opportunities-flexible-efficient-and-reliable-spectrum-1, 2003.
[2] J. Mitola and G. Q. Maguire, "Cognitive radio: making software radios more personal," in IEEE Personal
Communications, vol. 6, no. 4, pp. 13-18, Aug 1999.
[3] F. Zhou, N. C. Beaulieu, Z. Li, J. Si and P. Qi, "Energy-Efficient Optimal Power Allocation for Fading Cognitive
Radio Channels: Ergodic Capacity, Outage Capacity, and Minimum-Rate Capacity," IEEE Transactions on
Wireless Communications, vol. 15, no. 4, pp. 2741-2755, April 2016.
[4] N. Zhao, F. R. Yu, H. Sun and M. Li, "Adaptive Power Allocation Schemes for Spectrum Sharing in
Interference-Alignment-Based Cognitive Radio Networks," IEEE Transactions on Vehicular Technology,
vol. 65, no. 5, pp. 3700-3714, May 2016.
[5] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan and V. K. Bhargava, "A Survey on Non-Orthogonal
Multiple Access for 5G Networks: Research Challenges and Future Trends," IEEE Journal on Selected Areas in
Communications, vol. 35, no. 10, pp. 2181-2195, Oct 2017.
[6] T. L. Nguyen and Dinh-Thuan Do, "Exploiting Impacts of Intercell Interference on SWIPT-Assisted
Non-Orthogonal Multiple Access," Wireless Communications and Mobile Computing, vol. 2018, pp. 1-12,
Article ID 2525492, November 2018.
[7] L. Dai, B. Wang, Y. Yuan, S. Han, C. I and Z. Wang, "Non-orthogonal multiple access for 5G: solutions,
challenges, opportunities, and future research trends," IEEE Communications Magazine, vol. 53, no. 9,
pp. 74-81, September 2015.
[8] S. M. R. Islam, N. Avazov, O. A. Dobre, and K.-S. Kwak, “Power-Domain Non-Orthogonal Multiple Access
(NOMA) in 5G Systems: Potentials and Challenges,” IEEE Commun. Surveys & Tutorials, vol. 19, no. 2,
pp. 721–742, 2017.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 191 - 198
198
[9] H. Chingoska, Z. Hadzi-Velkov, I. Nikoloska and N. Zlatanov, “Resource Allocation in Wireless Powered
Communication Networks with Non-Orthogonal Multiple Access,” IEEE Wireless Communications Letters, vol. 5,
no. 6, pp. 684-687, Dec 2016.
[10] P. D. Diamantoulakis, K. N. Pappi, Z. Ding and G. K. Karagiannidis, “Wireless-Powered Communications with
Non-Orthogonal Multiple Access,” IEEE Transactions on Wireless Communications, vol. 15, no. 12,
pp. 8422-8436, Dec 2016.
[11] P. D. Diamantoulakis, K. N. Pappi, G. K. Karagiannidis, H. Xing and A. Nallanathan, “Joint Downlink/Uplink
Design for Wireless Powered Networks with Interference,” IEEE Access, vol. 5, pp. 1534-1547, 2017.
[12] Dinh-Thuan Do and Chi-Bao Le, “Application of NOMA in Wireless System with Wireless Power Transfer
Scheme: Outage and Ergodic Capacity Performance Analysis,” Sensors, vol. 18, no. 10, 2018.
[13] Dinh-Thuan Do and M. S. Van Nguyen, “Device-to-device transmission modes in NOMA network with and
without Wireless Power Transfer,” Computer Communications, vol. 139, No. 1, pp. 67-77, May 2019.
[14] D. Do, M. Vaezi and T. Nguyen, “Wireless Powered Cooperative Relaying Using NOMA with Imperfect CSI,”
2018 IEEE Globecom Workshops, Abu Dhabi, United Arab Emirates, pp. 1-6, 2018.
[15] D. T. Do and A. T. Le, “NOMA based cognitive relaying: Transceiver hardware impairments, relay selection
policies and outage performance comparison,” Computer Communications, vol. 146, pp. 144-154, May 2019.
[16] Dinh-Thuan Do, Chi-Bao Le, A. T. Le, “Cooperative underlay cognitive radio assisted NOMA: secondary network
improvement and outage performance,” TELKOMNIKA Telecommunication Computing Electronics and Control,
vol. 17, no. 5, pp. 2147-2154, October 2019.
[17] Dinh-Thuan Do, T. T. Thi Nguyen, “Exact Outage Performance Analysis of Amplify-and Forward-Aware
Cooperative NOMA,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 16, no. 5,
pp. 1966-1973, October 2018.
[18] D. T. Do et al. “Wireless power transfer enabled NOMA relay systems: two SIC modes and performance
evaluation,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 17, no. 6, pp. 2697-2703,
December 2019.
[19] Thanh-Luan Nguyen and Dinh-Thuan Do, “Power Allocation Schemes for Wireless Powered NOMA Systems with
Imperfect CSI: System model and performance analysis,” International Journal of Communication Systems,
vol. 31, no. 10, August 2018.
[20] D. T. Do, A. T. Le and B. M. Lee, “On Performance Analysis of Underlay Cognitive Radio-Aware Hybrid
OMA/NOMA Networks with Imperfect CSI,” Electronics, vol. 8, no. 7, July 2019.
[21] D. T. Do, A. T. Le, C. B. Le and B. M. Lee “On Exact Outage and Throughput Performance of Cognitive Radio
based Non-Orthogonal Multiple Access Networks with and Without D2D Link,” Sensors, vol. 19, July 2019.
[22] D. T. Do, M. S. Van Nguyen, T. A. Hoang, B.-M. Lee, “Exploiting Joint Base Station Equipped Multiple Antenna
and Full-Duplex D2D Users in Power Domain Division Based Multiple Access Networks,” Sensors, vol. 19,
no. 11, May 2019.
[23] D. T. Do, M. S. V. Nguyen, T. A. Hoang and M. Voznak, “NOMA-Assisted Multiple Access Scheme for IoT
Deployment: Relay Selection Model and Secrecy Performance Improvement,” Sensors, vol. 19, no. 3, Feb 2019.
[24] G. Nauryzbayev, S. Arzykulov, T. A. Tsiftsis and M. Abdallah, “Performance of Cooperative Underlay CR-NOMA
Networks over Nakagami-m Channels,” 2018 IEEE International Conference on Communications Workshops
(ICC Workshops), pp. 1-6, 2018.
[25] G. Im and J. H. Lee, “Outage Probability for Cooperative NOMA Systems with Imperfect SIC in Cognitive Radio
Networks,” in IEEE Communications Letters, vol. 23, no. 4, pp. 692-695, April 2019.

More Related Content

What's hot

Outage performance of downlink NOMA-aided small cell network with wireless po...
Outage performance of downlink NOMA-aided small cell network with wireless po...Outage performance of downlink NOMA-aided small cell network with wireless po...
Outage performance of downlink NOMA-aided small cell network with wireless po...
journalBEEI
 
Circularly polarized antenna array based on hybrid couplers for 5G devices
Circularly polarized antenna array based on hybrid couplers for 5G devicesCircularly polarized antenna array based on hybrid couplers for 5G devices
Circularly polarized antenna array based on hybrid couplers for 5G devices
journalBEEI
 
Estimating cellphone signal intensity &amp; identifying radiation hotspot are...
Estimating cellphone signal intensity &amp; identifying radiation hotspot are...Estimating cellphone signal intensity &amp; identifying radiation hotspot are...
Estimating cellphone signal intensity &amp; identifying radiation hotspot are...
eSAT Journals
 
Performance analysis of beam divergence propagation through rainwater and sno...
Performance analysis of beam divergence propagation through rainwater and sno...Performance analysis of beam divergence propagation through rainwater and sno...
Performance analysis of beam divergence propagation through rainwater and sno...
journalBEEI
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
eSAT Journals
 
dfsdfsdfIjett v4 i7p177
dfsdfsdfIjett v4 i7p177dfsdfsdfIjett v4 i7p177
dfsdfsdfIjett v4 i7p177
Mhmd Alawasa
 
Design and analysis of microstrip antenna with zig-zag feeder for wireless co...
Design and analysis of microstrip antenna with zig-zag feeder for wireless co...Design and analysis of microstrip antenna with zig-zag feeder for wireless co...
Design and analysis of microstrip antenna with zig-zag feeder for wireless co...
journalBEEI
 
On limits of Wireless Communications in a Fading Environment: a General Param...
On limits of Wireless Communications in a Fading Environment: a General Param...On limits of Wireless Communications in a Fading Environment: a General Param...
On limits of Wireless Communications in a Fading Environment: a General Param...
ijeei-iaes
 
The impact of intermodulation interference in superimposed 2 g and 3g
The impact of intermodulation interference in superimposed 2 g and 3gThe impact of intermodulation interference in superimposed 2 g and 3g
The impact of intermodulation interference in superimposed 2 g and 3gPrecious Kamoto
 
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELS
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELSBER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELS
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELS
IJCNCJournal
 
Physical layer network coding
Physical layer network codingPhysical layer network coding
Physical layer network coding
Nguyen Tan
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
Equalization & Channel Estimation of Block & Comb Type Codes
Equalization & Channel Estimation of Block & Comb Type CodesEqualization & Channel Estimation of Block & Comb Type Codes
Equalization & Channel Estimation of Block & Comb Type Codes
AM Publications
 
Effect on Channel Capacity of Multi-User MIMO System in Crowded Area
Effect on Channel Capacity of Multi-User MIMO System in Crowded AreaEffect on Channel Capacity of Multi-User MIMO System in Crowded Area
Effect on Channel Capacity of Multi-User MIMO System in Crowded Area
IJEEE
 
Mc cdma performance on single
Mc cdma performance on singleMc cdma performance on single
Mc cdma performance on single
csandit
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Editor IJARCET
 
5G beam-steering 2×2 butler matrix with slotted waveguide antenna array
5G beam-steering 2×2 butler matrix with slotted waveguide antenna array5G beam-steering 2×2 butler matrix with slotted waveguide antenna array
5G beam-steering 2×2 butler matrix with slotted waveguide antenna array
TELKOMNIKA JOURNAL
 

What's hot (19)

Outage performance of downlink NOMA-aided small cell network with wireless po...
Outage performance of downlink NOMA-aided small cell network with wireless po...Outage performance of downlink NOMA-aided small cell network with wireless po...
Outage performance of downlink NOMA-aided small cell network with wireless po...
 
Circularly polarized antenna array based on hybrid couplers for 5G devices
Circularly polarized antenna array based on hybrid couplers for 5G devicesCircularly polarized antenna array based on hybrid couplers for 5G devices
Circularly polarized antenna array based on hybrid couplers for 5G devices
 
Estimating cellphone signal intensity &amp; identifying radiation hotspot are...
Estimating cellphone signal intensity &amp; identifying radiation hotspot are...Estimating cellphone signal intensity &amp; identifying radiation hotspot are...
Estimating cellphone signal intensity &amp; identifying radiation hotspot are...
 
Performance analysis of beam divergence propagation through rainwater and sno...
Performance analysis of beam divergence propagation through rainwater and sno...Performance analysis of beam divergence propagation through rainwater and sno...
Performance analysis of beam divergence propagation through rainwater and sno...
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
 
dfsdfsdfIjett v4 i7p177
dfsdfsdfIjett v4 i7p177dfsdfsdfIjett v4 i7p177
dfsdfsdfIjett v4 i7p177
 
Ab03301680176
Ab03301680176Ab03301680176
Ab03301680176
 
Design and analysis of microstrip antenna with zig-zag feeder for wireless co...
Design and analysis of microstrip antenna with zig-zag feeder for wireless co...Design and analysis of microstrip antenna with zig-zag feeder for wireless co...
Design and analysis of microstrip antenna with zig-zag feeder for wireless co...
 
On limits of Wireless Communications in a Fading Environment: a General Param...
On limits of Wireless Communications in a Fading Environment: a General Param...On limits of Wireless Communications in a Fading Environment: a General Param...
On limits of Wireless Communications in a Fading Environment: a General Param...
 
The impact of intermodulation interference in superimposed 2 g and 3g
The impact of intermodulation interference in superimposed 2 g and 3gThe impact of intermodulation interference in superimposed 2 g and 3g
The impact of intermodulation interference in superimposed 2 g and 3g
 
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELS
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELSBER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELS
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELS
 
Physical layer network coding
Physical layer network codingPhysical layer network coding
Physical layer network coding
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Equalization & Channel Estimation of Block & Comb Type Codes
Equalization & Channel Estimation of Block & Comb Type CodesEqualization & Channel Estimation of Block & Comb Type Codes
Equalization & Channel Estimation of Block & Comb Type Codes
 
Effect on Channel Capacity of Multi-User MIMO System in Crowded Area
Effect on Channel Capacity of Multi-User MIMO System in Crowded AreaEffect on Channel Capacity of Multi-User MIMO System in Crowded Area
Effect on Channel Capacity of Multi-User MIMO System in Crowded Area
 
Mc cdma performance on single
Mc cdma performance on singleMc cdma performance on single
Mc cdma performance on single
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
 
5G beam-steering 2×2 butler matrix with slotted waveguide antenna array
5G beam-steering 2×2 butler matrix with slotted waveguide antenna array5G beam-steering 2×2 butler matrix with slotted waveguide antenna array
5G beam-steering 2×2 butler matrix with slotted waveguide antenna array
 
Wcdma
WcdmaWcdma
Wcdma
 

Similar to Study on outage performance gap of two destinations on CR-NOMA network

Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...
journalBEEI
 
Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...
journalBEEI
 
Tractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMA
TELKOMNIKA JOURNAL
 
Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...
TELKOMNIKA JOURNAL
 
Analysis on the performance of pointing error effects for RIS-aided FSO link ...
Analysis on the performance of pointing error effects for RIS-aided FSO link ...Analysis on the performance of pointing error effects for RIS-aided FSO link ...
Analysis on the performance of pointing error effects for RIS-aided FSO link ...
TELKOMNIKA JOURNAL
 
Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...
TELKOMNIKA JOURNAL
 
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
journalBEEI
 
Cooperative underlay cognitive radio assisted NOMA: secondary network improve...
Cooperative underlay cognitive radio assisted NOMA: secondary network improve...Cooperative underlay cognitive radio assisted NOMA: secondary network improve...
Cooperative underlay cognitive radio assisted NOMA: secondary network improve...
TELKOMNIKA JOURNAL
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
journalBEEI
 
Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...
journalBEEI
 
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
TELKOMNIKA JOURNAL
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
nooriasukmaningtyas
 
Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...
journalBEEI
 
Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...
TELKOMNIKA JOURNAL
 
Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...
TELKOMNIKA JOURNAL
 
Employing non-orthogonal multiple access scheme in UAV-based wireless networks
Employing non-orthogonal multiple access scheme in UAV-based wireless networksEmploying non-orthogonal multiple access scheme in UAV-based wireless networks
Employing non-orthogonal multiple access scheme in UAV-based wireless networks
journalBEEI
 
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
TELKOMNIKA JOURNAL
 
Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...
IJECEIAES
 
1. 20934.pdf
1. 20934.pdf1. 20934.pdf
1. 20934.pdf
TELKOMNIKA JOURNAL
 
Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...
journalBEEI
 

Similar to Study on outage performance gap of two destinations on CR-NOMA network (20)

Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...
 
Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...
 
Tractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMA
 
Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...
 
Analysis on the performance of pointing error effects for RIS-aided FSO link ...
Analysis on the performance of pointing error effects for RIS-aided FSO link ...Analysis on the performance of pointing error effects for RIS-aided FSO link ...
Analysis on the performance of pointing error effects for RIS-aided FSO link ...
 
Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...
 
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
 
Cooperative underlay cognitive radio assisted NOMA: secondary network improve...
Cooperative underlay cognitive radio assisted NOMA: secondary network improve...Cooperative underlay cognitive radio assisted NOMA: secondary network improve...
Cooperative underlay cognitive radio assisted NOMA: secondary network improve...
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
 
Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...
 
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
 
Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...
 
Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...
 
Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...
 
Employing non-orthogonal multiple access scheme in UAV-based wireless networks
Employing non-orthogonal multiple access scheme in UAV-based wireless networksEmploying non-orthogonal multiple access scheme in UAV-based wireless networks
Employing non-orthogonal multiple access scheme in UAV-based wireless networks
 
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
 
Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...
 
1. 20934.pdf
1. 20934.pdf1. 20934.pdf
1. 20934.pdf
 
Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
TELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
TELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
TELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
TELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
TELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
TELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
TELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
TELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
TELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 

Recently uploaded (20)

Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 

Study on outage performance gap of two destinations on CR-NOMA network

  • 1. TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 1, February 2020, pp. 191~198 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i1.13271  191 Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA Study on outage performance gap of two destinations on CR-NOMA network Hong-Nhu Nguyen1 , Chi-Bao Le2 , Nhat-Tien Nguyen3 , Dinh-Thuan Do4 1,3 Faculty of Electronics and Telecommunications, Saigon University, Ho Chi Minh City, Vietnam 2,4 Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh City, Vietnam Article Info ABSTRACT Article history: Received Jun 2, 2019 Revised Nov 11, 2019 Accepted Nov 30, 2019 Non-orthogonal multiple access (NOMA) and cognitive radio (CR) are promising to overcome spectral scarcity problem encountered in applications implementations in wireless communication. Especially, massive connectivity in such network is strict requirement in network deployment. This study aims to improve spectral efficiency at two secondary destinations by investigating a CR-NOMA network under situation of the perfect successive interference cancellation (SIC). We also derive the exact outage probability for secondary users. Furthermore, an approximate computation method is applied to indicate more insights. It is confirmed that the performance achieved together with performance gap among two users can be obtained due to different power allocation factors assigned to users. Keywords: Cognitive radio Non-orthogonal multiple access SIC This is an open access article under the CC BY-SA license. Corresponding Author: Dinh-Thuan Do, Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh City, Vietnam. Email: dodinhthuan@iuh.edu.vn 1. INTRODUCTION The spectral efficient and energy-efficient requirements are necessary to satisfy the explosive increase of mobile user in wireless system with high-rate services. However, high spectral efficiency (SE) cannot be achieved since the fixed spectrum allocation strategy is adopted. Unfortunately, 30 percentages of the licensed spectrum in the United States is fully occupied as the report from the Federal Communications Commission [1]. By allowing the primary network to share its frequency band with the secondary network, cognitive radio (CR) has been studied and hence SE improvement achieved [2]. In principle of CR, spectrum sharing paradigm permits the secondary users (SUs) to operate together with the primary users (PUs) at the same band and power constraint must be obeyed to limit interference impact caused by the PUs [3, 4]. Several techniques such as cellular networks, relay networks, and wireless sensor networks, benefit from implementation of CR to provide the potential SE improvement. To further provide massive connectivity, more advantages can be achieved by employing multiple access for mobile users. In particular, the network allocates resource to users by dividing the total radio resources with two underlying techniques, i.e. orthogonal multiple access (OMA) and non-orthogonal multiple access (NOMA). The interference can be eliminated in OMA scheme while NOMA employs successive interference cancellation (SIC) technique to alleviate interference from other users’ signal [5]. By exploiting the users’ channel asymmetry, NOMA can remarkably enhance the SE and then the transmission latency can be reduced [5-8]. The authors in [9] showed that the achievable rate region in the uplink NOMA is improved in comparison with OMA and such analysis is adopted in wireless powered communication
  • 2.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 191 - 198 192 (WPC) networks. In [10], main results reported that NOMA with advantage of improved user fairness and it provide more benefits compared to OMA. It is further proved that NOMA performs better than OMA in both downlink and uplink by achieving the problem of joint maximization of the downlink/uplink rates while taking fairness between users is satisfied [11]. In [12], the authors presented energy efficiency in wireless powered NOMA networks and system performance is evaluated. In addition, recent works [13-22] considered advantage of NOMA to implement in emerging networks. In particular, this paper develops system based on results in [23-25]. More specifically, in this paper, we formulate the received signal at the secondary user (SU) which can extract the data signal by using SINR or SNR. The outage probability (OP) of the SU are analyzed in details in terms of probability of SINR and SNR. The results show that CR-NOMA provide fairness to two users in term of OP. 2. SYSTEM MODEL We assume that the system model with a downlink dual-hop underlay cognitive radio–non-orthogonal multiple access (CR-NOMA) network shown in Figure 1, in which there are a primary destination (PD) who is located in primary network (PN), a secondary source (BS), a relay (R) operating in half-duplex mode and two destination users (U1; U2). The wireless channels follow Rayleigh fading-channel 𝑢 with channel gain 𝛺 𝑢. These channels assigned as in Figure 1 are h0, h1, g1 and g2, are independent and identically distributed (i.i.d.) zero-mean complex Gaussian random variables (RVs). Single antenna is assumed at each node. In this scenario, a perfect channel state information (CSI) is adopted. As Figure 1, the distances between nodes are denoted by h0, h1, g1 and g2. In CR-NOMA, the BS make interference to PD. It is noted that R requires decode-and-forward (DF) mode to forward signal to far users. It is assumed that R is placed very far from the transmit primary source PD and hence it cannot interfere with the primary network as shown in Figure 1. The power constraint for operations of both primary network and secondary network is considered in this context. BS U2 g1 U1 g2 Secondary link Interference link R PD h1 h0 Secondary network Primary network Figure 1. NOMA in cognitive radio network The transmit power at secondary source is set based on constraint as above consideration 𝑃𝐵𝑆 ≤ 𝑚𝑖𝑛 ( 𝐼 |ℎ0|2 , 𝑃̄ 𝐵𝑆) (1) where 𝑃̄ 𝐵𝑆 and 𝐼 is denoted as the maximum average transmit power available at 𝐵𝑆 and interference temperature constraint (ITC) at 𝑃𝐷, respectively. We call 𝑎1, 𝑎2as power allocation factors. In the first time slot, R received the following signal 𝑦 𝑅( 𝑘) = ℎ1[√ 𝑃𝐵𝑆 𝑎1 𝑠1( 𝑘) + √ 𝑃𝐵𝑆 𝑎2 𝑠2( 𝑘)] + 𝑛 𝑅( 𝑘) (2) where ℎ0~𝒞𝒩(0, 𝛺ℎ0), ℎ1~𝒞𝒩(0, 𝛺ℎ1), 𝑛 𝑅~𝒞𝒩(0, 𝜎 𝑅 2), it is assumed that 𝑎1 > 𝑎2nd 𝑎1 + 𝑎2 = 1. By using NOMA, to detect signal s2 R decodes and removes s1 from the received signal. Therefore, it need be determined the signal-to-interference-plus noise ratio (SINR) and signal-to-noise ratio (SNR) to detect s1 and s2 at R as follows 𝛾 𝑅,𝑠1 = 𝜌 𝐵𝑆 𝑎1|ℎ1|2 𝜌 𝐵𝑆 𝑎2|ℎ1|2+1 (3)
  • 3. TELKOMNIKA Telecommun Comput El Control  Study on outage performance gap of two destinations on CR-NOMA network (Hong-Nhu Nguyen) 193 where 𝜌 𝐵𝑆 = 𝑃 𝐵𝑆 𝜎 𝑅 2 𝛾 𝑅,𝑠2 = 𝜌 𝐵𝑆 𝑎2|ℎ1|2 (4) Then, within the second slot, R forwards the detected superimposed signal √ 𝑃𝑅 𝑎1 𝑠̃1( 𝑘) + √ 𝑃𝑅 𝑎2 𝑠̃2( 𝑘), where PR is the transmitted power at R, 𝑠̃1( 𝑘)and 𝑠̃2( 𝑘)are the detected and forwarded data to the respective receivers. Therefore, Ui receives the following signal: 𝑦 𝑅𝑈 𝑖 ( 𝑘) = 𝑔𝑖[√ 𝑃𝑅 𝑎1 𝑠̃1( 𝑘) + √ 𝑃𝑅 𝑎2 𝑠̃2( 𝑘)] + 𝑛 𝑅𝑈 𝑖 ( 𝑘) (5) where 𝑖 ∈ {1,2}, 𝑔𝑖~𝒞𝒩(0, 𝛺 𝑔𝑖) and 𝑛 𝑅~𝒞𝒩(0, 𝜎 𝑅𝐷 𝑖 2 ). Furthermore, U2 implements SIC by detecting 𝑠̃1( 𝑘)while considering its own data 𝑠̃2( 𝑘)as a noise. The SINR of which can be written as: 𝛾 𝑅𝑈2,𝑠1 = 𝜌 𝑅 𝑎1|𝑔2|2 𝜌 𝑅 𝑎2|𝑔2|2+1 (6) where 𝜌 𝑅 = 𝑃 𝑅 𝜎 𝑅𝐷 𝑖 2 . Then, by alleviate interference existing in (6) it can be detected the remaining signal. Therefore, to detects its own signal at U2 , SNR is given by 𝛾 𝑅𝑈2,𝑠2 = 𝜌 𝑅 𝑎2|𝑔2|2 (7) It is worth noting that U1 is allocated with higher power factor, s1 has higher priority to detect compared with remaining signal, then SINR is expressed by 𝛾 𝑅𝑈1,𝑠1 = 𝜌 𝑅 𝑎1|𝑔1|2 𝜌 𝑅 𝑎2|𝑔1|2+1 (8) 3. PERFORMANCE ANALYSIS AND NUMERICAL RESULTS 3.1. Outage probability analysis at user 1 In this section, we examine the outage probability (OP) for s1 and s2. In [10-13], the OP of a signal is defined as the probability that the achievable rate is below than a predefined rate threshold 𝑅𝑡ℎ𝑟, i.e., 𝑃 𝑈1 = 𝑃𝑅[ 𝑅1 < 𝑅𝑡ℎ𝑟]. Therefore, the OP of s1 can be derived as: ( )( ) ( )1 1 1 1 1 1 1 1 , , 1 , 1 , 1 2 2 1 1 1 1 1 12 2 2 2 1 2 1 0 2 2 1 1 1 1 1 12 2 2 2 2 1 0 2 1 0 Pr min , 1 Pr , 1 Pr , , 1 1 Pr , , 1 U R s RU s R s RU s BS R I BS BS R A I R I BS I R a h a g a h a g h a h a g a h h a g h                        =  = −         = −      + +    +    + + 2A         (9) where 𝜌𝐼 = 𝐼 𝜎 𝑃 𝐷 2 and 𝛾1 = 22𝑅1 − 1 is SNR related to interference and SNR related to target rate 𝑅1of user 𝑈1 respectively. Based on distribution functions of wireless channels, it can be expressed as: ( ) ( ) ( )2 2 2 1 1 0 1 1 0 2 2 2 1 1 1 0 0 Pr , , 1 I BS BS R I BS h R g BS h I h g h BS R BS A h g h f x dx f y dy f z dz e e                    − − −      =    =      =  −         (10)
  • 4.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 191 - 198 194 where 𝜓 = 𝛾1 (𝑎1−𝛾1 𝑎2) . In similar way, it can be computed the second part of (9) as: ( ) ( ) ( )2 2 2 1 10 1 0 1 10 1 2 2 2 20 2 1 1 0 11 1 1 0 1 0 Pr , , 1 1 I R IS I g BS h I h R gh I h I R BS I g hh yI R BS x y I h g h I h h h A h g h f x dx f y f z dydz e dx e dy e                              − − + −− +                 =    =      = =    +       (11) by replacing (9) by (10) and (11), (9) can be re-expressed as: 𝒫𝑈1 = 1 − [𝑒 − 𝜓 𝜌̄ 𝐵𝑆 𝛺ℎ1 − 𝜓 𝜌 𝑅 (1 − 𝑒 − 𝜌 𝐼 𝜌̄ 𝐵𝑆 𝛺ℎ0) + 𝜌 𝐼 𝛺ℎ1 𝜌 𝐼 𝛺ℎ1+𝜓𝛺ℎ0 𝑒 − 𝜌 𝐼 𝜌̄ 𝐵𝑆 ( 1 𝛺ℎ0 + 𝜓 𝜌 𝐼 𝛺ℎ1 )− 𝜓 𝜌 𝑅 𝛺 𝑔1] (12) it is noted that the above formula is correct when𝑎1 > 𝛾1 𝑎2. 3.2. Outage probability analysis if perfect SIC at user 2 Similar to the signal s1, at user 𝑈1, the OP of the signal s2 can be expressed as: ( )( ) ( )2 2 2 2 2 2 2 1 2 , , 2 , 2 , 2 2 2 2 1 2 2 2 2 2 0 2 22 1 2 2 2 22 2 0 0 Pr min , 1 Pr , 1 Pr , , Pr , , pSIC U R x RU x R x RU x I BS R BS B I I R BS B a h a g h a h a g h h                    =  = −         = −              +          (13) where 𝛾2 = 22𝑅2 − 1 with 𝑅2 corresponding target rate of 𝑈2. The first part and the second part of (13) can be further computed by: ( ) ( ) ( ) 2 2 1 2 2 2 0 2 2 2 1 2 0 2 2 2 2 2 2 22 2 1 1 2 0 2 2 0 Pr , , 1 I IBS BS h R g BS h BS R I BS R BS a a h g h a a B h g h a a f x dx f y dy f z dz e e                    − − −      =         = =  −         (14) then, other term can be given as: ( ) ( ) ( )2 2 2 2 10 2 2 2 2 22 2 0 1 20 1 2 2 2 2 2 2 22 0 2 2 1 2 0 2 2 11 1 2 2 0 1 2 2 0 Pr , , 1 1 I R BS I I g BS h I hh I h I R BS I g hh yI R BS a a x y aa I h g h I h h a h B h g h f x dx f y f z dydz a a a e dx e dy e a                              − − +− +              =    =      = =    +       2 2 2R g a   −  (15) by substituting (15) and (14) into (13), (13) can be rewritten as:
  • 5. TELKOMNIKA Telecommun Comput El Control  Study on outage performance gap of two destinations on CR-NOMA network (Hong-Nhu Nguyen) 195 𝒫𝑈2 𝑝𝑆𝐼𝐶 = 1 − [𝑒 − 𝛾2 𝜌̄ 𝐵𝑆 𝛺ℎ1 𝑎2 − 𝛾2 𝜌 𝑅 𝛺 𝑔2 𝑎2 (1 − 𝑒 − 𝜌 𝐼 𝜌̄ 𝐵𝑆 𝛺ℎ0) + 𝜌𝐼 𝛺ℎ1 𝑎2 𝜌𝐼 𝛺ℎ1 𝑎2+𝛾2 𝛺ℎ0 𝑒 − 𝜌 𝐼 𝜌̄ 𝐵𝑆 ( 1 𝛺ℎ0 + 𝛾2 𝜌 𝐼 𝛺ℎ1 𝑎2 )− 𝛾2 𝜌 𝑅 𝛺 𝑔2 𝑎2] (16) 3.3. Outage analysis if imperfect SIC at user 2 The SINR and signal-to-noise ratio (SNR) of decoding s2 at R and at destination 𝑈2 can be respectively written as: 𝛾 𝑅,𝑠2 = 𝜌 𝐵𝑆 𝑎2|ℎ1|2 𝜌 𝐵𝑆|𝑓1|2+1 (17) 𝛾 𝑅𝑈2,𝑠2 = 𝜌 𝑅 𝑎2|𝑔2|2 𝜌 𝑅|𝑓2|2+1 (18) then, the OP in case of imperfect SIC at 𝑈2can be calculated by: ( )( ) ( ) 2 2 2 2 2 2 2 1 , , 2 , 2 , 2 2 2 2 1 2 2 2 22 2 2 1 2 0 2 2 2 1 2 2 2 22 2 2 2 1 0 2 0 Pr min , 1 Pr , 1 Pr , , 1 1 Pr , , 1 ipSIC U R x RD x R x RD x BS R I BS BS R C I R I BS I R a h a g f f h a h a g f h f h                        =  = −         = −      + +      +     + +  2C       (19) similarly, (19) can be rewritten as: ( ) 2 2 1 2 2 20 2 2 2 0 2 2 2 11 2 1 2 2 1 2 2 2 11 12 10 2 2 2 2 2 2 2 2 2 1 1 1 1 1 1 I h BS R gBS h I BS h BS R g a a f fipSIC U h g a afh f R R g R g I e e a a a a e a a                   −− − −−   −− − − −−         = −  −  + +                + + +  +          (20) 3.4. Asymptotic analysis This part provides approximate performance as extra insights in our conisdered system. When 𝜌 → ∞, it can be applied 𝑒−𝑥 ≈ 1 − 𝑥, then approximate performance can be archived as below. The approximate OP of user 𝑈1can be given by: 𝒫𝑎𝑠𝑦𝑚,𝑈1 ∞ = 1 − [(1 − 𝜓 𝜌̄ 𝐵𝑆 𝛺ℎ1 − 𝜓 𝜌 𝑅 ) 𝜌 𝐼 𝜌̄ 𝐵𝑆 𝛺ℎ0 + 𝜌 𝐼 𝛺ℎ1 𝜌 𝐼 𝛺ℎ1+𝜓𝛺ℎ0 (1 − 𝜌 𝐼 𝛺ℎ0 𝜌̄ 𝐵𝑆 − 𝜓𝜌 𝐼 𝜌 𝐼 𝜌̄ 𝐵𝑆 𝛺ℎ1 − 𝜓 𝜌 𝑅 𝛺 𝑔1 )] (21) the approximate OP of user 𝑈2in case of perfect SIC can be given by: 2 , 2 2 , 1 2 2 2 0 1 2 2 2 1 2 2 0 0 1 2 2 2 1 1 1 pSIC I asym U BS h R g BS h I h I I I h h h BS I BS h R g a a a a a a                     = − − −        + − − −    +       (22)
  • 6.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 191 - 198 196 the approximate OP of user 𝑈2in case of imperfect SIC can be formulated by: ( ) 2 11 2 1 2 2, 2 2 , 0 1 2 2 2 1 2 2 2 11 12 10 2 2 2 2 2 2 2 2 2 2 2 0 2 2 2 1 1 1 1 1 1 1 f fipSIC I asym U BS h h BS R g h g fh f R R g I I R g BS h BS R g a a a a a a a a a a                    −−  −− −        = − − − + +                    + + +  +            − − −        (23) 3.5. Throughput In term of throughput, each user can be shown throughput performance as: 𝜏 𝑈⋆ = (1 − 𝒫 𝑈⋆ )𝑅⋆ (24) where ⋆∈ {1,2}. 4. NUMERICAL RESULTS In this section, we evaluate the performance of CR-NOMA, we set power allocation factors 𝑎1 = 0.8 and 𝑎2 = 0.2, the target rate is set to be 𝑅1 = 1 and 𝑅2 = 1.5, the channel gains 𝛺ℎ0 = 1, 𝛺ℎ1 = 1, 𝛺 𝑔1 = 1, 𝛺 𝑔2 = 0.4, 𝛺𝑓1 = 𝛺𝑓2 = 0.001. Interference between PN and SNR is 𝜌𝐼 = 40 𝑑𝐵. Figure 2 and Figure 3 plot the OP of two secondary destinations, as varying interference level 𝜌𝐼 and power allocation factor, transmit SNR. Outage performance of 𝑈1 is better than that of 𝑈2. It can be seen that when higher transmit SNR is required, outage performance will be improved significantly at considered range of SNR and OP meets saturation trend as SNR is from 50 (dB) to 60 (dB). The asymptotic curves match with the analytical curves very well at high SNR. This output confirms exact approximate expressions of outage probability archived for two users. It is intuitively seen that no ITC case exhibits lowest performance since no harmful interference from the PN exists. It can be seen performance gap of these cases with different data rate is small, it exhibit acceptance performance for such NOMA with acceptable small value of target rate. In addition, Monte-Carlo simulation results match with analytical results very well in whole range of SNR. Figure 4 proved that higher rate result in worst case of outage performance. In addition, as observation from Figure 5, throughput is high at high SNR and high 𝜌𝐼. Figure 2. Outage performance versus SNR at secondary source Figure 3. Impact of ITC on outage performance versus SNR at secondary source
  • 7. TELKOMNIKA Telecommun Comput El Control  Study on outage performance gap of two destinations on CR-NOMA network (Hong-Nhu Nguyen) 197 Figure 4. Outage performance versus target rates,with 𝜌𝐼 = 20 ( 𝑑𝐵), 𝑎1 = 0.9and 𝑎2 = 0.1 Figure 5. Throughput performance 5. CONCLUSION In this paper, CR-NOMA networks over Rayleigh fading channels is studied by exploring the end-to-end closed-form expressions to indicate outage performance . To compare the outage performance of two secondary destinations, we derived expressions of outage probability and then numerical results are provided performance comparisons of two users in CR-NOMA network. As main result, the fairness of two users is satisfied as in numerical results by the proper selection of power allocation factors. Other condition is that interference to primary network can be constrained. Moreover, comparison results of the outage behavior showed that 𝑈1 performs better than 𝑈2 in considered scenarios. Finally, in the future work, we will consider multiple users who operate in manner of CR-NOMA network. ACKNOWLEDGEMENTS The authors would like to thank the anonymous reviews for the helpful comments and suggestions.This work is a part of the basic science research program CS2019-42 funded by the Saigon University. Correspondence should be addressed to Dinh-Thuan Do (dodinhthuan@iuh.edu.vn). REFERENCES [1] Federal Communications Commisions, “Facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies,” Washington, DC, USA, Tech. Rep. FCC 02-155, [Online], Available: https://www.fcc.gov/document/facilitating-opportunities-flexible-efficient-and-reliable-spectrum-1, 2003. [2] J. Mitola and G. Q. Maguire, "Cognitive radio: making software radios more personal," in IEEE Personal Communications, vol. 6, no. 4, pp. 13-18, Aug 1999. [3] F. Zhou, N. C. Beaulieu, Z. Li, J. Si and P. Qi, "Energy-Efficient Optimal Power Allocation for Fading Cognitive Radio Channels: Ergodic Capacity, Outage Capacity, and Minimum-Rate Capacity," IEEE Transactions on Wireless Communications, vol. 15, no. 4, pp. 2741-2755, April 2016. [4] N. Zhao, F. R. Yu, H. Sun and M. Li, "Adaptive Power Allocation Schemes for Spectrum Sharing in Interference-Alignment-Based Cognitive Radio Networks," IEEE Transactions on Vehicular Technology, vol. 65, no. 5, pp. 3700-3714, May 2016. [5] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan and V. K. Bhargava, "A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends," IEEE Journal on Selected Areas in Communications, vol. 35, no. 10, pp. 2181-2195, Oct 2017. [6] T. L. Nguyen and Dinh-Thuan Do, "Exploiting Impacts of Intercell Interference on SWIPT-Assisted Non-Orthogonal Multiple Access," Wireless Communications and Mobile Computing, vol. 2018, pp. 1-12, Article ID 2525492, November 2018. [7] L. Dai, B. Wang, Y. Yuan, S. Han, C. I and Z. Wang, "Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends," IEEE Communications Magazine, vol. 53, no. 9, pp. 74-81, September 2015. [8] S. M. R. Islam, N. Avazov, O. A. Dobre, and K.-S. Kwak, “Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges,” IEEE Commun. Surveys & Tutorials, vol. 19, no. 2, pp. 721–742, 2017.
  • 8.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 191 - 198 198 [9] H. Chingoska, Z. Hadzi-Velkov, I. Nikoloska and N. Zlatanov, “Resource Allocation in Wireless Powered Communication Networks with Non-Orthogonal Multiple Access,” IEEE Wireless Communications Letters, vol. 5, no. 6, pp. 684-687, Dec 2016. [10] P. D. Diamantoulakis, K. N. Pappi, Z. Ding and G. K. Karagiannidis, “Wireless-Powered Communications with Non-Orthogonal Multiple Access,” IEEE Transactions on Wireless Communications, vol. 15, no. 12, pp. 8422-8436, Dec 2016. [11] P. D. Diamantoulakis, K. N. Pappi, G. K. Karagiannidis, H. Xing and A. Nallanathan, “Joint Downlink/Uplink Design for Wireless Powered Networks with Interference,” IEEE Access, vol. 5, pp. 1534-1547, 2017. [12] Dinh-Thuan Do and Chi-Bao Le, “Application of NOMA in Wireless System with Wireless Power Transfer Scheme: Outage and Ergodic Capacity Performance Analysis,” Sensors, vol. 18, no. 10, 2018. [13] Dinh-Thuan Do and M. S. Van Nguyen, “Device-to-device transmission modes in NOMA network with and without Wireless Power Transfer,” Computer Communications, vol. 139, No. 1, pp. 67-77, May 2019. [14] D. Do, M. Vaezi and T. Nguyen, “Wireless Powered Cooperative Relaying Using NOMA with Imperfect CSI,” 2018 IEEE Globecom Workshops, Abu Dhabi, United Arab Emirates, pp. 1-6, 2018. [15] D. T. Do and A. T. Le, “NOMA based cognitive relaying: Transceiver hardware impairments, relay selection policies and outage performance comparison,” Computer Communications, vol. 146, pp. 144-154, May 2019. [16] Dinh-Thuan Do, Chi-Bao Le, A. T. Le, “Cooperative underlay cognitive radio assisted NOMA: secondary network improvement and outage performance,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 17, no. 5, pp. 2147-2154, October 2019. [17] Dinh-Thuan Do, T. T. Thi Nguyen, “Exact Outage Performance Analysis of Amplify-and Forward-Aware Cooperative NOMA,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 16, no. 5, pp. 1966-1973, October 2018. [18] D. T. Do et al. “Wireless power transfer enabled NOMA relay systems: two SIC modes and performance evaluation,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 17, no. 6, pp. 2697-2703, December 2019. [19] Thanh-Luan Nguyen and Dinh-Thuan Do, “Power Allocation Schemes for Wireless Powered NOMA Systems with Imperfect CSI: System model and performance analysis,” International Journal of Communication Systems, vol. 31, no. 10, August 2018. [20] D. T. Do, A. T. Le and B. M. Lee, “On Performance Analysis of Underlay Cognitive Radio-Aware Hybrid OMA/NOMA Networks with Imperfect CSI,” Electronics, vol. 8, no. 7, July 2019. [21] D. T. Do, A. T. Le, C. B. Le and B. M. Lee “On Exact Outage and Throughput Performance of Cognitive Radio based Non-Orthogonal Multiple Access Networks with and Without D2D Link,” Sensors, vol. 19, July 2019. [22] D. T. Do, M. S. Van Nguyen, T. A. Hoang, B.-M. Lee, “Exploiting Joint Base Station Equipped Multiple Antenna and Full-Duplex D2D Users in Power Domain Division Based Multiple Access Networks,” Sensors, vol. 19, no. 11, May 2019. [23] D. T. Do, M. S. V. Nguyen, T. A. Hoang and M. Voznak, “NOMA-Assisted Multiple Access Scheme for IoT Deployment: Relay Selection Model and Secrecy Performance Improvement,” Sensors, vol. 19, no. 3, Feb 2019. [24] G. Nauryzbayev, S. Arzykulov, T. A. Tsiftsis and M. Abdallah, “Performance of Cooperative Underlay CR-NOMA Networks over Nakagami-m Channels,” 2018 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 1-6, 2018. [25] G. Im and J. H. Lee, “Outage Probability for Cooperative NOMA Systems with Imperfect SIC in Cognitive Radio Networks,” in IEEE Communications Letters, vol. 23, no. 4, pp. 692-695, April 2019.