Claim Missing Document
Check
Articles

Found 3 Documents
Search

Study on outage performance gap of two destinations on CR-NOMA network Hong-Nhu Nguyen; Chi-Bao Le; Nhat-Tien Nguyen; Dinh-Thuan Do
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i1.13271

Abstract

Non-orthogonal multiple access (NOMA) and cognitive radio (CR) are promising for solving the severe spectral scarcity problem encountered by the next generation of wireless communication systems. This study aims to improve spectral efficiency at two secondary destinations by investigating a CR-NOMA network under situation of the perfect successive interference cancellation (SIC). We also derive the exact outage probability for secondary users. Furthermore, an approximate computation method is applied to indicate more insights. It is confirmed that the performance achieved together with performance gap among two users can be obtained due to different power allocation factors assigned to users.
Outage performance analysis of NOMA over log-normal fading distribution in presence of CSI and SIC imperfections Chi-Bao Le; Hong-Nhu Nguyen; Huy Hung Nguyen; Thi-Hau Nguyen; Nhan Duc Nguyen
Bulletin of Electrical Engineering and Informatics Vol 11, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i3.3395

Abstract

The evolution of wireless communication networks has introduced various applications that require massive device connectivity and high spectral efficiency. Non-orthogonal multiple access (NOMA) technique is one of the most promising technologies to perform efficiently data transmission. The NOMA technique can allocate the same resource block for two users by super-imposing signals. At the receiver, the signals are separated by performing successive interference cancellation (SIC) technique. For efficient data transmission, the fading and shadowing effects of channels also play a pivotal role. Many researches have considered Rayleigh, Rician, Nakagami-m, and other fading channels in various perspectives. In our paper, a system model based on a NOMA network with two users over log-normal fading distribution in the presence of channel estimation errors and SIC imperfections is proposed. The performance is analyzed in terms of outage probability and simulations are performed with the assistance of Monte-Carlo simulations. The obtained results shown the effectiveness in comparison with the traditionally used fading distributions. The same analysis is also performed in various scenarios of power allocation levels, target rates, and imperfections. The transmit SNR and power allocation of the users are important for efficient communication in any fading distribution as shown in this paper.
Secrecy performance analysis on spatial modeling of wireless communications with unmanned aerial vehicle and ground devices Cuu Ho Van; Hong-Nhu Nguyen; Si-Phu Le; Miroslav Voznak
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 6: December 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i6.pp6410-6418

Abstract

In this paper, the secrecy performance of the spatial modeling for ground devices with randomly placed eavesdroppers when an unmanned aerial vehicle (UAV) acted as two hops decode and forward (DF) was investigated. We characterize the secrecy outage probability (SOP) and intercept probability (IP) expressions. Our capacity performance analysis is based on the Rayleigh fading distributions. After analytical results by Monte Carlo simulation, and the Gauss-Chebyshev parameter was selected to yield a close approximation, the results demonstrate the SOP with the average signal-to-noise ratio (SNR) between UAV and ground users among the eavesdroppers and the IP relationship with the ability to intercept the information of the ground users successfully.