191 research outputs found
Enabling full-duplex in multiple access technique for 5G wireless networks over Rician fading channels
Nowadays, unmanned aerial vehicle (UAV) relays’assisted Internet of Things (IoT) systems provide facility in order to overcome the large scale fading between source and sink. The full-duplex scheme enables wireless network to provide higher spectrum efficient technology. This paper analyses performance of two users which are served by new emerging non-orthogonal multiple access (NOMA) technique. Exact outage probability of such two users are derived and checked via Monte-Carlo simulation. These analytical results provide guideline to design UAV in real application. This paper provides a comprehensive study to examine impact of interference, fixed power allocation factors to system performance
A Survey on Applications of Cache-Aided NOMA
Contrary to orthogonal multiple-access (OMA), non-orthogonal multiple-access (NOMA) schemes can serve a pool of users without exploiting the scarce frequency or time domain resources. This is useful in meeting the future network requirements (5G and beyond systems), such as, low latency, massive connectivity, users' fairness, and high spectral efficiency. On the other hand, content caching restricts duplicate data transmission by storing popular contents in advance at the network edge which reduces data traffic. In this survey, we focus on cache-aided NOMA-based wireless networks which can reap the benefits of both cache and NOMA; switching to NOMA from OMA enables cache-aided networks to push additional files to content servers in parallel and improve the cache hit probability. Beginning with fundamentals of the cache-aided NOMA technology, we summarize the performance goals of cache-aided NOMA systems, present the associated design challenges, and categorize the recent related literature based on their application verticals. Concomitant standardization activities and open research challenges are highlighted as well
Throughput Optimization for NOMA Energy Harvesting Cognitive Radio with Multi-UAV-Assisted Relaying under Security Constraints
This paper investigates the throughput of a non-orthogonal multiple access (NOMA)-based cognitive radio (CR) system with multiple unmanned aerial vehicle (UAV)-assisted relays under system performance and security constraints. We propose a communication protocol that includes an energy harvesting (EH) phase and multiple communication phases. In the EH phase, the multiple UAV relays (URs) harvest energy from a power beacon. In the first communication phase, a secondary transmitter (ST) uses the collected energy to send confidential signals to the first UR using NOMA. Simultaneously, a ground base station communicates with a primary receiver (PR) under interference from the ST. In the subsequent communication phases, the next URs apply the decode-and-forward technique to transmit the signals. In the last communication phase, the Internet of Things destinations (IDs) receive their signals in the presence of an eavesdropper (EAV). Accordingly, the outage probability of the primary network, the throughput of the secondary network, and the leakage probability at the EAV are analyzed. On this basis, we propose a hybrid search method combining particle swarm optimization (PSO) and continuous genetic algorithm (CGA) to optimize the UR configurations and the NOMA power allocation to maximize the throughput of the secondary network under performance and security constraints
NON-ORTHOGONAL MULTIPLE ACCESS: A COMPREHENSIVE ANALYTICAL STUDY AND OPTIMISATION IN FADING CHANNELS
Multiple Access in Aerial Networks: From Orthogonal and Non-Orthogonal to Rate-Splitting
Recently, interest on the utilization of unmanned aerial vehicles (UAVs) has
aroused. Specifically, UAVs can be used in cellular networks as aerial users
for delivery, surveillance, rescue search, or as an aerial base station (aBS)
for communication with ground users in remote uncovered areas or in dense
environments requiring prompt high capacity. Aiming to satisfy the high
requirements of wireless aerial networks, several multiple access techniques
have been investigated. In particular, space-division multiple access(SDMA) and
power-domain non-orthogonal multiple access (NOMA) present promising
multiplexing gains for aerial downlink and uplink. Nevertheless, these gains
are limited as they depend on the conditions of the environment. Hence, a
generalized scheme has been recently proposed, called rate-splitting multiple
access (RSMA), which is capable of achieving better spectral efficiency gains
compared to SDMA and NOMA. In this paper, we present a comprehensive survey of
key multiple access technologies adopted for aerial networks, where aBSs are
deployed to serve ground users. Since there have been only sporadic results
reported on the use of RSMA in aerial systems, we aim to extend the discussion
on this topic by modelling and analyzing the weighted sum-rate performance of a
two-user downlink network served by an RSMA-based aBS. Finally, related open
issues and future research directions are exposed.Comment: 16 pages, 6 figures, submitted to IEEE Journa
Evolution of NOMA Toward Next Generation Multiple Access (NGMA) for 6G
Due to the explosive growth in the number of wireless devices and diverse
wireless services, such as virtual/augmented reality and
Internet-of-Everything, next generation wireless networks face unprecedented
challenges caused by heterogeneous data traffic, massive connectivity, and
ultra-high bandwidth efficiency and ultra-low latency requirements. To address
these challenges, advanced multiple access schemes are expected to be
developed, namely next generation multiple access (NGMA), which are capable of
supporting massive numbers of users in a more resource- and
complexity-efficient manner than existing multiple access schemes. As the
research on NGMA is in a very early stage, in this paper, we explore the
evolution of NGMA with a particular focus on non-orthogonal multiple access
(NOMA), i.e., the transition from NOMA to NGMA. In particular, we first review
the fundamental capacity limits of NOMA, elaborate on the new requirements for
NGMA, and discuss several possible candidate techniques. Moreover, given the
high compatibility and flexibility of NOMA, we provide an overview of current
research efforts on multi-antenna techniques for NOMA, promising future
application scenarios of NOMA, and the interplay between NOMA and other
emerging physical layer techniques. Furthermore, we discuss advanced
mathematical tools for facilitating the design of NOMA communication systems,
including conventional optimization approaches and new machine learning
techniques. Next, we propose a unified framework for NGMA based on multiple
antennas and NOMA, where both downlink and uplink transmissions are considered,
thus setting the foundation for this emerging research area. Finally, several
practical implementation challenges for NGMA are highlighted as motivation for
future work.Comment: 34 pages, 10 figures, a survey paper accepted by the IEEE JSAC
special issue on Next Generation Multiple Acces
Secondary Network Throughput Optimization of NOMA Cognitive Radio Networks Under Power and Secure Constraints
Recently, the combination of cognitive radio networks with the nonorthogonal multiple
access (NOMA) approach has emerged as a viable option for not only improving spectrum usage but also
supporting large numbers of wireless communication connections. However, cognitive NOMA networks
are unstable and vulnerable because multiple devices operate on the same frequency band. To overcome
this drawback, many techniques have been proposed, such as optimal power allocation and interference
cancellation. In this paper, we consider an approach by which the secondary transmitter (STx) is able
to find the best licensed channel to send its confidential message to the secondary receivers (SRxs) by
using the NOMA technique. To combat eavesdroppers and achieve reasonable performance, a power
allocation policy that satisfies both the outage probability (OP) constraint of primary users and the security
constraint of secondary users is optimized. The closed-form formulas for the OP at the primary base station
and the leakage probability for the eavesdropper are obtained with imperfect channel state information.
Furthermore, the throughput of the secondary network is analyzed to evaluate the system performance.
Based on that, two algorithms (i.e., the continuous genetic algorithm (CGA) for CR NOMA (CGA-CRN)
and particle swarm optimization (PSO) for CR NOMA (PSO-CRN)), are applied to optimize the throughput
of the secondary network. These optimization algorithms guarantee not only the performance of the primary
users but also the security constraints of the secondary users. Finally, simulations are presented to validate
our research results and provide insights into how various factors affect system performance
Secondary Network Throughput Optimization of NOMA Cognitive Radio Networks Under Power and Secure Constraints
Recently, the combination of cognitive radio networks with the nonorthogonal multiple access (NOMA) approach has emerged as a viable option for not only improving spectrum usage but also supporting large numbers of wireless communication connections. However, cognitive NOMA networks are unstable and vulnerable because multiple devices operate on the same frequency band. To overcome this drawback, many techniques have been proposed, such as optimal power allocation and interference cancellation. In this paper, we consider an approach by which the secondary transmitter (STx) is able to find the best licensed channel to send its confidential message to the secondary receivers (SRxs) by using the NOMA technique. To combat eavesdroppers and achieve reasonable performance, a power allocation policy that satisfies both the outage probability (OP) constraint of primary users and the security constraint of secondary users is optimized. The closed-form formulas for the OP at the primary base station and the leakage probability for the eavesdropper are obtained with imperfect channel state information. Furthermore, the throughput of the secondary network is analyzed to evaluate the system performance. Based on that, two algorithms (i.e., the continuous genetic algorithm (CGA) for CR NOMA (CGA-CRN) and particle swarm optimization (PSO) for CR NOMA (PSO-CRN)), are applied to optimize the throughput of the secondary network. These optimization algorithms guarantee not only the performance of the primary users but also the security constraints of the secondary users. Finally, simulations are presented to validate our research results and provide insights into how various factors affect system performance
- …