38 research outputs found

    Performance Analysis for NOMA Relaying System in Next-Generation Networks with RF Energy Harvesting

    Get PDF
    In this chapter, we investigate the performance of the non-orthogonal multiple access (NOMA) relaying network with radio-frequency (RF) power transfer. Specifically, this considered system consists of one RF power supply station, one source, one energy-constrained relay, and multiple energy-constrained NOMA users. The better user and relay can help the source to forward the message to worse user by using the energy harvested from the power station. The triple-phase harvest-transmit-forward transmission protocol is proposed for this considered system. The exact closed-form expressions of outage probability and throughput for each link and whole system are derived by using the statistical characteristics of signal-to-noise ratio (SNR) and signal-to-interference-plus-noise ratio (SINR) of transmission links. In order to understand more detail about the behavior of this considered system, the numerical results are provided according to the system key parameters, such as the transmit power, number of users, time switching ratio, and power allocation coefficients. The simulation results are also provided to confirm the correctness of our analysis

    On the optimal user grouping in NOMA system technology

    Get PDF
    This paper provides a state-of-art analysis of the most relevant studies on optimal user-aggregation strategies for non-orthogonal multiple access (NOMA) technology. The main ideas behind are i) to highlight how, in addition to the adoption of an optimal power allocation scheme, an optimal user-aggregation strategy represents an important key factor for improving NOMA system performance, and ii) to provide an exhaustive survey of the most relevant studies which can serve as useful starting point for the definition of new channel state-aware user-aggregation strategies for NOMA systems which, at the time of writing, represents a research field that still remains to be investigated more in depth. A detailed and complete analysis, which permits to point out the need to guarantee a certain relationship between users’ channel gain, is provided for each cited work

    Opportunistic Networks: Present Scenario- A Mirror Review

    Get PDF
    Opportunistic Network is form of Delay Tolerant Network (DTN) and regarded as extension to Mobile Ad Hoc Network. OPPNETS are designed to operate especially in those environments which are surrounded by various issues like- High Error Rate, Intermittent Connectivity, High Delay and no defined route between source to destination node. OPPNETS works on the principle of “Store-and-Forward” mechanism as intermediate nodes perform the task of routing from node to node. The intermediate nodes store the messages in their memory until the suitable node is not located in communication range to transfer the message to the destination. OPPNETs suffer from various issues like High Delay, Energy Efficiency of Nodes, Security, High Error Rate and High Latency. The aim of this research paper is to overview various routing protocols available till date for OPPNETs and classify the protocols in terms of their performance. The paper also gives quick review of various Mobility Models and Simulation tools available for OPPNETs simulation

    Secondary Network Throughput Optimization of NOMA Cognitive Radio Networks Under Power and Secure Constraints

    Get PDF
    Recently, the combination of cognitive radio networks with the nonorthogonal multiple access (NOMA) approach has emerged as a viable option for not only improving spectrum usage but also supporting large numbers of wireless communication connections. However, cognitive NOMA networks are unstable and vulnerable because multiple devices operate on the same frequency band. To overcome this drawback, many techniques have been proposed, such as optimal power allocation and interference cancellation. In this paper, we consider an approach by which the secondary transmitter (STx) is able to find the best licensed channel to send its confidential message to the secondary receivers (SRxs) by using the NOMA technique. To combat eavesdroppers and achieve reasonable performance, a power allocation policy that satisfies both the outage probability (OP) constraint of primary users and the security constraint of secondary users is optimized. The closed-form formulas for the OP at the primary base station and the leakage probability for the eavesdropper are obtained with imperfect channel state information. Furthermore, the throughput of the secondary network is analyzed to evaluate the system performance. Based on that, two algorithms (i.e., the continuous genetic algorithm (CGA) for CR NOMA (CGA-CRN) and particle swarm optimization (PSO) for CR NOMA (PSO-CRN)), are applied to optimize the throughput of the secondary network. These optimization algorithms guarantee not only the performance of the primary users but also the security constraints of the secondary users. Finally, simulations are presented to validate our research results and provide insights into how various factors affect system performance

    Secondary Network Throughput Optimization of NOMA Cognitive Radio Networks Under Power and Secure Constraints

    Get PDF
    Recently, the combination of cognitive radio networks with the nonorthogonal multiple access (NOMA) approach has emerged as a viable option for not only improving spectrum usage but also supporting large numbers of wireless communication connections. However, cognitive NOMA networks are unstable and vulnerable because multiple devices operate on the same frequency band. To overcome this drawback, many techniques have been proposed, such as optimal power allocation and interference cancellation. In this paper, we consider an approach by which the secondary transmitter (STx) is able to find the best licensed channel to send its confidential message to the secondary receivers (SRxs) by using the NOMA technique. To combat eavesdroppers and achieve reasonable performance, a power allocation policy that satisfies both the outage probability (OP) constraint of primary users and the security constraint of secondary users is optimized. The closed-form formulas for the OP at the primary base station and the leakage probability for the eavesdropper are obtained with imperfect channel state information. Furthermore, the throughput of the secondary network is analyzed to evaluate the system performance. Based on that, two algorithms (i.e., the continuous genetic algorithm (CGA) for CR NOMA (CGA-CRN) and particle swarm optimization (PSO) for CR NOMA (PSO-CRN)), are applied to optimize the throughput of the secondary network. These optimization algorithms guarantee not only the performance of the primary users but also the security constraints of the secondary users. Finally, simulations are presented to validate our research results and provide insights into how various factors affect system performance

    Host Transcription Profile in Nasal Epithelium and Whole Blood of Hospitalized Children Under 2 Years of Age With Respiratory Syncytial Virus Infection.

    Get PDF
    BACKGROUND: Most insights into the cascade of immune events after acute respiratory syncytial virus (RSV) infection have been obtained from animal experiments or in vitro models. METHODS: In this study, we investigated host gene expression profiles in nasopharyngeal (NP) swabs and whole blood samples during natural RSV and rhinovirus (hRV) infection (acute versus early recovery phase) in 83 hospitalized patients <2 years old with lower respiratory tract infections. RESULTS: Respiratory syncytial virus infection induced strong and persistent innate immune responses including interferon signaling and pathways related to chemokine/cytokine signaling in both compartments. Interferon-α/β, NOTCH1 signaling pathways and potential biomarkers HIST1H4E, IL7R, ISG15 in NP samples, or BCL6, HIST2H2AC, CCNA1 in blood are leading pathways and hub genes that were associated with both RSV load and severity. The observed RSV-induced gene expression patterns did not differ significantly in NP swab and blood specimens. In contrast, hRV infection did not as strongly induce expression of innate immunity pathways, and significant differences were observed between NP swab and blood specimens. CONCLUSIONS: We conclude that RSV induced strong and persistent innate immune responses and that RSV severity may be related to development of T follicular helper cells and antiviral inflammatory sequelae derived from high activation of BCL6

    Cooperative Transmission in Uplink NOMA Networks with Wireless Power Transfer

    No full text
    5G networks and wireless power transfer are the topics that have attracted both academic and industry communities in recent years. In this paper, we study the cooperative transmission of uplink non-orthogonal multiple access (NOMA) network with wireless power transfer in terms of performance analysis. Specifically, energy-constrained amplifyand-forward relay cooperates with two users that applying NOMA scheme to transmit the message to base station by using the energy harvested from base station. For performance analysis, we derive the closed-form expressions of outage probability and throughput for two users based on the statistical characteristics of signal-to-noise ratio (SNR) and signalto-interference-plus-noise ratio (SINR) by using the Gaussian-Chebyshev quadrature method. To understand more detail of the behaviour of this considered system, the numerical results are provided according to the system key parameters, e.g., transmit power, distances. Furthermore, the theoretical results are also verified by the Monte-Carlo simulation

    On secure QoS-based NOMA networks with multiple antennas and eavesdroppers over Nakagami-m fading

    No full text
    In this paper, we study the physical layer security of a downlink multi-input single-output non-orthogonal multiple access (NOMA) system, in which transmit antenna selection (TAS) scheme, users' quality of service (QoS) requirements, Nakagami-m fading channel, and user selection solution are considered for secure NOMA transmission. Specifically, we investigate the scenario that a base station (BS) (source) communicates with two legitimate user (LU) clusters with different priority depending on their QoS requirements in the presence of multiple passive eavesdroppers over Nakagami-m fading. To enhance the secrecy performance, we examine a TAS scheme and a user selection method. In this context, prior to transmission, a transmit antenna and a user in high-priority LU cluster are jointly selected to maximize the channel quality of the link from the BS to the selected user. Furthermore, together with the selected high-priority user, a user in low-priority LU cluster, which has the best channel condition, is chosen for performing two-user NOMA. In order to evaluate the secrecy performance, tight and asymptotic closed-form expressions of secrecy outage probability for selected LUs and overall system are derived. Our theoretical results confirmed by Monte-Carlo simulation show that in QoS-based NOMA system, high-priority users cause the higher effects on the overall secrecy performance in comparison with low-priority users. Finally, these results also indicate that our proposed communication protocol achieves the secrecy performance greater than conventional protocol.Web of Scienc
    corecore