Next Article in Journal
A MIMO-SAR Tomography Algorithm Based on Fully-Polarimetric Data
Previous Article in Journal
Normalized Method for Land Surface Temperature Monitoring on Coastal Reclaimed Areas
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Outage Performance Improvement by Selected User in D2D Transmission and Implementation of Cognitive Radio-Assisted NOMA

1
Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City 700000, Vietnam
2
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh City 700000, Vietnam
3
School of Intelligent Mechatronics Engineering, Sejong University, Seoul 05006, Korea
*
Authors to whom correspondence should be addressed.
Sensors 2019, 19(22), 4840; https://doi.org/10.3390/s19224840
Submission received: 4 October 2019 / Revised: 31 October 2019 / Accepted: 1 November 2019 / Published: 6 November 2019
(This article belongs to the Section Sensor Networks)

Abstract

:
In this paper, we investigate the outage performance in secondary network of cognitive radio (CR) employing non-orthogonal multiple access (NOMA) wireless networks over Rayleigh fading channels. The considered system model adopts device-to-device (D2D) transmission together with traditional communication to form a new system model, namely CR-D2DNOMA network. The specific user is selected from multiple D2D-Tx users (D2Ds) to communicate with far NOMA users to form qualified D2D connection with assistance of the Relay user ( R U ). The main metric in such CR-D2DNOMA network needs to be considered and we particularly introduce the closed-form expressions for outage probability in the secondary network where it is designed to serve two far NOMA users. The perfect Successive Interference Cancellation (SIC) and imperfect SIC can be further examined at the second NOMA user who detects signal based on the ability of SIC. The results show the positive impact of increasing the fading parameters on the system performance. More importantly, numerical results are provided to verify the correctness of our derivations. Additionally, the effects of asymptotic expressions on insights evaluation are also further analyzed.

1. Introduction

To improve current statistic spectrum use, cognitive radio (CR) is proposed as a spectrum-sharing technique in which a primary user (PU) permits a secondary user (SU) to occupy idle spectrum assigned to such PU. However, the normal communications of the PU must satisfy since non-existence of interference between the SUs and the PUs. Regarding capability of spectrum sensing, a binary detection problem is way to help the SU sense the idle spectrum as in [1,2,3]. In the traditional system, the idle channel is allocated to the SU when the absence of the PU is detected. In the other hand, SU is not able to operate due to lack of channel in case of full occupation of PU’s channels. By comparing between a prior known threshold and the accumulated energy statistic of the PU signal, such energy detection scheme is widely employed to detect the PU. If the energy statistic is less than the threshold, the PU is detected to be absent [4,5,6,7]. detection probability and false alarm probability are two factors affecting the performance of energy detection. highly reliable detection of the idle channel can be achieved as low false alarm probability happened, while highly accurate detection on the presence of the PU results from high detection probability. To improve detection probability and decrease false alarm probability, the detection performance depends on the sensing time [8,9]. Such technique can be implemented to design 5G wireless such as recent results reported in [10]. The authors in [11] presented spectrum access scheme, namely listen-before-talk, in which sensing slot and transmission slot are both arranged in the frame and the transmission slot contains the SU’s signal, then the idle channel was identified in the sensing slot.
To provide reliable communication, the authors in [12,13] reported advantages of relaying network in terms of outage performance. By permitting transmission in two hop, system improvement can be achieved since it combines relaying scheme with non-orthogonal multiple access (NOMA). Regarding improvement of spectrum efficiency, same advantages found in CR, NOMA is promising spectrum enhancement technique. Cooperative NOMA with advantages in system performance is introduced in recent works [14,15,16]. To manage interference in these NOMA networks, successive interference cancellation (SIC) is required. Both primary user and secondary user can be served in the same time as combining NOMA and CR and such hybrid scheme does not harm on performance of primary users [17]. Furthermore, the potential to realize ubiquitous connectivity for future networks would be extra benefit from the combination of NOMA and CR. In the context of CR in NOMA systems, a secondary user who possess a strong channel condition, and it is squeezed into the spectrum involved in a primary user using a poor channel condition [18]. As a result, the interference of secondary user can be limited when implementing NOMA in a cognitive network. As report from [18], it can be remained the quality of service (QoS) for users possessing poor channel conditions in such CR-NOMA because the transmit power allocated to other users is limited to satisfy power constraint from cognitive radio deployment. As main numerical result, this paper indicated a different behavior achieved from CR-NOMA can be seen in comparison with conventional NOMA due to this constraint [18].
From recent results reported in [19,20,21], capable of further improving the spectrum efficiency is main benefit from the combination of CR with NOMA. The second reason regarding popularity of, implementation on spectrum-sharing technique due to low implementational complexity. Main conclusion from in [19,20,21] indicated that NOMA can outperform traditional orthogonal multiple access in underlay CR networks by careful selections in terms of power allocation coefficients and target data rates of users. For example, new closed-form formula of the outage probability is derived and such important metric is used to characterize the performance of the considered network relying D2D transmission [19]. The authors in [20] studied hybrid scheme to achieve benefits from NOMA and OMA in reasonable manner. The second users first perform energy harvesting for spectrum sensing and an overlay and underlay mode are required to information transmission [21]. Furthermore, to maximize the achievable throughput for the CR network, the optimization problem is addressed while it remains constrained condition on the total the minimum rate requirements and transmission power of the secondary users [21]. Based on the available channel state information (CSI), application of NOMA to multicast cognitive radio networks (termed as MCR-NOMA) is investigated in terms of three different secondary user scheduling schemes [22]. To highlight advantage of cooperative, they provided new metric, termed as mutual outage probability [22].
In the other work, to enhance the spectral efficiency, there is existence of both primary users and secondary users in common network relying cooperative NOMA and it can be considered to be a special case of multiple access [23]. The other cooperative NOMA assisted underlay cognitive radio network is considered through approximate expressions for the outage probability and a relay is known as selected secondary user [24]. By assuming that the primary source’s interference is considered to be a constant, two metrics including the outage probability and the ergodic capacity to highlight performance of underlay cognitive radio network using cooperative NOMA [25].
To improve quality of received signal, the authors in [26,27,28,29] examined the multi-relay scenario. In cognitive radio networks, the best secondary user is selected to forward the signal to PU and the farthest SU using NOMA protocol while the base station (BS) transmits superimposed signals to both multiple secondary users and primary user (PU) in the same time [27]. Three secondary user scheduling strategies using multicast network to improve performance of both primary and second systems in terms of the robustness of data transmissions [30].
As an important paradigm in 5G systems, Device-to-device (D2D) communication has been investigate and has drawn lots of papers [31,32,33]. In principle, devices are allowed to communicate directly through cellular channels in D2D transmission. Such D2D scheme not only reduces the workload of the base station (BS) but also enhance spectrum efficiency [34,35,36,37]. In D2D scheme, it can be admitted existence of the device with qualified signal need help of the BS who provides reliability connection while main task of the BS is serving traditional cellular users. This paper first introduces user selection schemes in such CR-D2DNOMA network.
To summarize, the contribution of this paper is as follows:
  • Motivated from recent results in [38], we only concern performance of D2D links in secondary network of CR-D2DNOMA system. It is worth noting that normal Relay user (RU) is official served by the base station (BS) in the secondary network. While RU assists D2D transmission, it can receive signal from the BS. This situation makes interference harm operation of D2D link.
  • Impact of interference from the primary source (PS) in the primary network on the secondary network’s performance in such D2D assisted CR-NOMA is studied. The performance degradation can be controlled by limiting interference source and total transmit power constraint in CR-NOMA.
  • We provide main metric to compare performance between CR-NOMA and CR-OMA. In particular, exact closed-form expressions for the outage probability are provided. As expected result, it provides advantages of these techniques including D2D, NOMA, and CR.
  • Selected user is allowed to perform D2D transmission through nearby cellular user which forwards NOMA signals to far D2D users. Therefore, the traditional cognitive radio network can further serve D2D users with improved outage performance while remaining quality for normal cellular users.
  • These results can be useful in many practical applications, for example, evaluating the traditional channel model in CR-D2DNOMA network such as Rayleigh fading is resulted from this paper.
The rest of this paper is organized as follows: In Section 2, we illustrate our proposed cooperative relaying-based NOMA scheme. Section 3 analyzes the received signal and then outage performance is evaluated. Asymptotic expressions are further provided to look insight performance. Section 4, we illustrate our proposed cognitive radio network serving D2D connection based on OMA scheme. Numerical and simulation results are presented in Section 5. Section 6 concludes this paper.

2. System Model

This Figure 1 illustrates system model to implement a D2D transmission in NOMA-based cognitive radio (CR-D2DNOMA). As two main modes of D2D link, D2D users can communicate directly or through normal cellular user, but this paper considers the second cases. It is worth noting that the selected D2D link need help of nearby R U [39]. This system contains one group containing K D 2 D T x users ( D 2 D s ) D 2 D T x k , k = 1 , , K . These D 2 D T x users in the secondary network of such CR-D2DNOMA intend to communicate with far D2D users via Relay user ( R U ). In particular, D2D link employing NOMA scheme to serve many destinations. The far D2D users can be received signal via nearby R U without changing allocated power factors at R U . In addition, only selected D 2 D T x can communicate with D2D users under supporting by R U . More specifically, only strong link between D 2 D T x and R U is selected to allow possible D2D connection since large number of D 2 D T x located at different places and it reduces processing load at R U . It is assumed users distributed in a disc with radius D, the R U and far users are placed at edge while the BS is in the center. In general, there are two groups, i.e., the first group includes all D 2 D T x , the second group contains D2D users (NOMA users). One pair of D2D users that can use the downlink spectrum resource of the R U . It is assumed that all the D 2 D T x , RU and D2D users are equipped with one single antenna. It is denoted that g D k C is channel in link from D 2 D T x k , k = 1 , , K to R U , h p b , h p 1 , h p 2 are channels of links B S R U , P S D 1 , P S D 2 , respectively; g 1 , g 2 are channels of links R U D 1 , R U D 2 . Assume that the complex channel coefficient h u C N ( 0 ; λ u ) , u = p b , p 1 , p 2 ; g D k C C N ( 0 ; λ D C ) and g i C N ( 0 ; λ i ) , i = 1 , 2 with zero mean and variance λ u , λ D C and λ i , respectively. These channels follow Rayleigh fading model. While x 1 , x 2 are signals in NOMA scheme, x P S is the PS’s signal and x B S is the BS’s signal. A two-phase transmission framework with time interval of T seconds is adopted. The R U need be forwarded signal after performing Decode-and-Forward procedure on received signal from the dedicated D 2 D T x to far NOMA-based D2D users. Such D2D connection need assistance of the R U due to long transmission among pair of D2D users and it occupies two phases. To make analysis simple and without of general, same power allocation factors ε 1 , ε 2 are employed for two transmission phases. In addition, D2D connection is affected by interference from transmit source PS in the primary network of considered CR-D2DNOMA network and it is affected by interference from transmit source BS in the second network.
It is assumed that only user D 2 D T x is permitted to require D2D connection with far NOMA users. x 1 , x 2 are two signals corresponding to two destinations D 1 , D 2 . In this scenario, the received signal y D C corresponding transmit signal from D 2 D T x at the R U can be expressed by
y D C = P D 2 D g C k B ε 1 x 1 + ε 2 x 2 + P B S h p b x B S + ω R U ,
where P D 2 D and P B S are the transmit powers of selected D 2 D T x and B S , respectively. ε i ( i 1 , 2 ) is the power allocation coefficient for x i with ε 1 + ε 2 = 1 and ε 1 > ε 2 , and ω R U is the AWGN at D 2 D T x to R U .
The signal to interference plus noise ratio (SINR) to decode x 1 at D 2 D T x to R U is given by
γ D k C , x 1 = ε 1 P D 2 D g D k C 2 ε 2 P D 2 D g D k C 2 + P B S h p b 2 + N 0 .
After SIC, the SINR to decode x 2 is given by [38]
γ D k C , x 2 = ε 2 P D 2 D g D k C 2 P B S h p b 2 + N 0 .
In the second phase, R U transmits the signal consisting of the decoded and re-encoded symbols to the far D2D users. We call x P S is interference signal from the primary network. The received signal at D i , i = 1 , 2 is given by
y D 1 = P R U g 1 ε 1 x 1 + ε 2 x 2 + P P S h p 1 x P S + ω D 1 ,
y D 2 = P R U g 2 ε 1 x 1 + ε 2 x 2 + P P S h p 2 x P S + ω D 2 ,
where P R U and P P S are the transmit powers of selected R U and P S , respectively. ω D i is the AWGN at D i .
The SINR to decode x 1 at D 1 is formulated by
γ D 1 , x 1 = ε 1 P R U g 1 2 ε 2 P R U g 1 2 + P P S h p 1 2 + N 0 .
The SINR to decode x 1 at D 2 is computed as
γ D 2 x 1 = ε 1 P R U g 2 2 ε 2 P R U g 2 2 + P P S h p 2 2 + N 0 .
After SIC, the SINR to decode x 2 is given by
γ D 2 , x 2 = ε 2 P R U g 2 2 P P S h p 2 2 + N 0 .
The dedicated D 2 D T x k with index k can be selected to strengthen the D 2 D T x k to R U link as follows:
k * = arg max k = 1 , , K g D k C 2 .
The CDF and PDF of channel link D 2 D T x k to R U follows
F g D k * C 2 z = 1 k = 1 K K k 1 k 1 exp k z λ D C ,
and
f g D k * C 2 z = k = 1 K K k 1 k 1 k λ D C exp k z λ D C .
in which all links from the group of D 2 D T x k to R U is assumed as equal channel gains λ D C .

3. Outage Probability Analysis in NOMA

It is necessary to evaluate the outage behavior for considered system when the user quality of service (QoS) requirements can be satisfied in the communication system. The outage probability of transmission links over Rayleigh fading channels is examined for different users under two scenarios related to SIC operation.

3.1. Outage Probability at User D 1

According to NOMA scheme, the outage would not occur for the R U ’s signal detection related to signal of user D 1 and also would not happen detect its own information at destination. Such outage performance can be expressed by [38]
P D 1 = Pr γ D k * C , x 1 < γ 1 γ D 1 , x 1 < γ 1 = 1 Pr γ D k * C , x 1 > γ 1 , γ D 1 , x 1 > γ 1 = 1 Pr γ D k * C , x 1 > γ 1 A 1 × Pr γ D 1 , x 1 > γ 1 A 2 ,
where it is assumed that P = P B S = P D 2 D = P P S . γ i = 2 2 R i 1 and R i is the target rate to decode x i , i 1 , 2 .
Proposition 1.
The closed-form expression of outage probability at D 1 can be given by
P D 1 = 1 k = 1 K K k 1 k 1 P ε 1 γ 1 ε 2 λ D C k γ 1 P λ p b + P ε 1 γ 1 ε 2 λ D C exp k γ 1 N 0 P ε 1 γ 1 ε 2 λ D C × P ε 1 γ 1 ε 2 λ 1 γ 1 P λ p 1 + P ε 1 γ 1 ε 2 λ 1 exp γ 1 N 0 P ε 1 γ 1 ε 2 λ 1 .
Proof: 
See in Appendix A.

3.2. Outage Probability at User D 2

Regarding performance evaluation at user D 2 , capability needs to be computed to detect D 1 ’s information and also can detect its own information during the two slots. In particular, outage probability at user D 2 can be given as
P D 2 = Pr γ D k * C , x 2 < γ 2 γ D 2 , x 2 < γ 2 γ D 2 x 1 < γ 2 = 1 Pr γ D k * C , x 2 > γ 2 , γ D 2 , x 2 > γ 2 , γ D 2 x 1 > γ 2 = 1 Pr γ D k * C , x 2 > γ 2 B 1 × Pr γ D 2 , x 2 > γ 2 B 2 × Pr γ D 2 x 1 > γ 2 B 3 .
Proposition 2.
The outage performance of D 2 can be expressed by
P D 2 = 1 k = 1 K K k 1 k 1 ε 2 P λ D C k γ 2 P λ p b + ε 2 P λ D C exp k γ 2 N 0 ε 2 P λ D C × ε 2 P λ 2 γ 2 P λ p 2 + ε 2 P λ 2 exp γ 2 N 0 ε 2 P λ 2 × P ε 1 γ 2 ε 2 λ 2 γ 2 P λ p 2 + P ε 1 γ 2 ε 2 λ 2 exp γ 2 N 0 P ε 1 γ 2 ε 2 λ 2 .
Proof: 
See in Appendix B.

3.3. Consideration on Imperfect SIC

On worse case of imperfect SIC at user D 2 , the SINR to decode x 2 at R U is given by
γ D k C , x 2 i p = ε 2 P g D k C 2 ε 1 P h D k C 2 + P h p b 2 + N 0 ,
where h D k C C N 0 , τ λ D C i p , and τ , 0 τ 1 is the level of residual interference caused by imperfect SIC.
As imperfect SIC happens at user D 2 , the SINR to decode x 2 at D 2 is computed by
γ D 2 , x 2 i p = ε 2 P g 2 2 ε 1 P h 2 2 + P h p 2 2 + N 0 ,
where h 2 C N 0 , τ λ 2 i p .
It need be re-evaluated outage performance of user D 2 in worse case of imperfect SIC and it is given as
P D 2 i p = Pr γ D k * C , x 2 i p < γ 2 γ D 2 , x 2 i p < γ 2 γ D 2 x 1 < γ 2 = 1 Pr γ D k * C , x 2 i p > γ 2 , γ D 2 , x 2 i p > γ 2 , γ D 2 x 1 > γ 2 = 1 Pr γ D k * C , x 2 i p > γ 2 C 1 × Pr γ D 2 , x 2 i p > γ 2 C 2 × Pr γ D 2 x 1 > γ 2 .
Proposition 3.
The closed-form expression to evaluate outage performance, i.e., P D 2 i p can be expressed by
P D 2 i p = k = 1 K K k t = 1 K K t 1 k + t 2 exp k γ 2 N 0 ε 2 P λ D C × t ε 2 λ D C k γ 2 ε 1 λ D C i p + t ε 2 λ D C × ε 2 P λ D C k γ 2 P λ p b + ε 2 P λ D C × ε 2 ε 2 P λ 2 λ 2 γ 2 ε 1 λ 2 i p + ε 2 λ 2 γ 2 P λ p 2 + ε 2 P λ 2 exp γ 2 N 0 ε 2 P λ 2 × P ε 1 γ 2 ε 2 λ 2 γ 2 P λ p 2 + P ε 1 γ 2 ε 2 λ 2 exp γ 2 N 0 P ε 1 γ 2 ε 2 λ 2 .
Proof: 
See in Appendix C.

3.4. Asymptotic in NOMA

To provide insights in such system, as P some asymptotic computation of outage evaluations for two users D 1 , D 2 respectively as
P D 1 h i g h = 1 k = 1 K K k 1 k 1 ε 1 γ 1 ε 2 λ D C k γ 1 λ p b + ε 1 γ 1 ε 2 λ D C ε 1 γ 1 ε 2 λ 1 γ 1 λ p 1 + ε 1 γ 1 ε 2 λ 1 ,
and
P D 2 h i g h = 1 k = 1 K K k 1 k 1 ε 2 λ D C k γ 2 λ p b + ε 2 λ D C ε 2 λ 2 γ 2 λ p 2 + ε 2 λ 2 ε 1 γ 2 ε 2 λ 2 γ 2 λ p 2 + ε 1 γ 2 ε 2 λ 2 .
Similarly, scenario of imperfect SIC leads to corresponding performance degradation for D 2 and such outage behavior can be rewritten as
P D 2 a s y m i p = k = 1 K K k t = 1 K K t 1 k + t 2 t ε 2 λ D C k γ 2 ε 1 λ D C i p + t ε 2 λ D C × ε 2 λ D C k γ 2 λ p b + ε 2 λ D C × ε 2 ε 2 λ 2 λ 2 γ 2 ε 1 λ 2 i p + ε 2 λ 2 γ 2 λ p 2 + ε 2 λ 2 ε 1 γ 2 ε 2 λ 2 γ 2 λ p 2 + ε 1 γ 2 ε 2 λ 2 .

4. Conventional Multiple Access: OMA Mode

The received signal can be computed at the R U in OMA mode as
y D C i O M A = P g D k C x i + P h p b x B S + ω R U .
The SINR to decode x i at link D 2 D T x k to R U is given by
γ D k C , x i O M A = P g D k C 2 P h p b 2 + N 0 .
In the second phase, R U transmits the signal consisting of the decoded and re-encoded symbols to the secondary destinations. The received signal at D i , i = 1 , 2 is given by
y D i O M A = P g i x i + P h p i x p + ω D i .
The SINR to decode x 1 at D 1 is given by
γ D 1 , x 1 O M A = P g 1 2 P h p 1 2 + N 0 .
The SINR to decode x 2 at D 2 is given by
γ D 2 , x 2 O M A = P g 2 2 P h p 2 2 + N 0 .

4.1. Outage Performance at User D 1 in OMA Mode

In such mode, outage performance for the first destination can be rewritten as
P D 1 O M A = Pr γ D k * C , x 1 O M A < γ 1 O M A γ D 1 , x 1 O M A < γ 1 O M A = 1 Pr γ D k * C , x 1 O M A > γ 1 O M A , γ D 1 , x 1 O M A > γ 1 O M A = 1 Pr γ D k * C , x 1 O M A > γ 1 O M A E 1 × Pr γ D 1 , x 1 O M A > γ 1 O M A E 2 ,
where γ i O M A = 2 4 R i 1 .
E 1 is further computed as
E 1 = Pr P g D k * C 2 P h p b 2 + N 0 > γ 1 O M A = Pr g D k * C 2 > γ 1 O M A P h p b 2 + N 0 P = 0 1 F g D k * C 2 γ 1 O M A P x + N 0 P f h p b 2 x d x .
Then, E 1 is rewritten as
E 1 = 0 k = 1 K K k 1 k 1 exp k γ 1 O M A P x + N 0 P λ D C 1 λ p b exp x λ p b d x = 1 λ p b k = 1 K K k 1 k 1 exp k γ 1 O M A N 0 P λ D C 0 exp k γ 1 O M A P P λ D C + 1 λ p b x d x = k = 1 K K k 1 k 1 P λ D C k γ 1 O M A P λ p b + P λ D C exp k γ 1 O M A N 0 P λ D C .
While E 2 can be expressed by
E 2 = Pr P g 1 2 P h p 1 2 + N 0 > γ 1 O M A = Pr g 1 2 > γ 1 O M A P h p 1 2 + N 0 P = 0 1 F g 1 2 γ 1 O M A P x + N 0 P f h p 1 2 x d x .
In similar way, E 2 can be computed by
E 2 = 0 exp γ 1 O M A P x + N 0 P λ 1 1 λ p 1 exp x λ p 1 d x = 1 λ p 1 exp γ 1 O M A N 0 P λ 1 0 exp γ 1 O M A P P λ 1 + 1 λ p 1 x d x = P λ 1 γ 1 O M A P λ p 1 + P λ 1 exp γ 1 O M A N 0 P λ 1 .
As a result, P D 1 O M A can be formulated by
P D 1 O M A = 1 k = 1 K K k 1 k 1 P λ D C k γ 1 O M A P λ p b + P λ D C exp k γ 1 O M A N 0 P λ D C × P λ 1 γ 1 O M A P λ p 1 + P λ 1 exp γ 1 O M A N 0 P λ 1 .

4.2. Outage Performance at User D 2 in OMA Mode

By considering condition on outage behavior, outage performance can be seen at user D 2 in OMA mode as
P D 2 O M A = Pr γ D k * C , x 2 O M A < γ 2 O M A γ D 2 , x 2 O M A < γ 2 O M A = 1 Pr γ D k * C , x 2 O M A > γ 2 O M A , γ D 2 , x 2 O M A > γ 2 O M A = 1 Pr γ D k * C , x 2 O M A > γ 2 O M A F 1 × Pr γ D 2 , x 2 O M A > γ 2 O M A F 2 .
In similar computations of E 1 and E 2 it can be achieved F 1 and F 2 , then P D 2 O M A is given by
P D 2 O M A = 1 k = 1 K K k 1 k 1 P λ D C k γ 2 O M A P λ p b + P λ D C exp k γ 2 O M A N 0 P λ D C × P λ 2 γ 2 O M A P λ p 2 + P λ 2 exp γ 2 O M A N 0 P λ 2 .

4.3. Asymptotic Computation on Outage Probability in OMA Mode

In case of P , lower bound of outage probability for users D 1 , D 2 are respectively given as
P D 1 h i g h O M A = 1 k = 1 K K k 1 k 1 λ D C k γ 1 O M A λ p b + λ D C × λ 1 γ 1 O M A λ p 1 + λ 1 ,
and
P D 2 h i g h O M A = 1 k = 1 K K k 1 k 1 λ D C k γ 2 O M A λ p b + λ D C × λ 2 γ 2 O M A λ p 2 + λ 2 .
Remark 1.
Given the number of selected sources to serve D2D link, improvement can be achieved in terms of outage performance. It is predicted that asymptotic lines mainly depend on channel gains and target rates, regardless of transmit power level. In addition, performance gap among two uses remain in this scenario, and it is confirmed that fairness can be obtained by varying power allocation factors. Thus, there exists a trade-off between the rates of user D 1 and D 2 and outage metric which exhibits the fundamental performance of the system.

5. Simulation Results

In this section, to validate the proposed analytical expressions, the simulation results need be considered in terms of the outage probabilities (OP). We use MATLAB to indicate possible evaluations on such system performance. The related expressions are derived in the previous section. Furthermore, the maximal throughputs are analyzed to evaluate the performance of the CR-D2DNOMA system under different channel conditions.
Figure 2 illustrates the outage probability varies under increasing transmit power P from −20 (dB) to 60 (dB). More specifically, two scenarios are studied for user D 2 , i.e., imperfect SIC and perfect SIC at the receivers of user D 2 . For these scenarios, we set channel gains of related links as λ D C = λ 1 = λ 2 = 10 , λ p b = λ p 1 = λ p 2 = λ D C i p = λ 2 i p = 0.01 . For power allocation factors assigned to each NOMA user, we set ε 1 = 0.8 . It can be seen clearly that tight matching simulation and analysis results means the correctness of the analytical outage probability which is verified by simulation results. The asymptotic curves match with exact curves at very high value of P. As a result, the correctness of the asymptotic expressions corresponding the considered schemes is also verified. It is shown that user D 1 achieves the smallest outage probabilities with K = 2 in the whole SNR regime. The main reason makes worse outage behavior at user D 2 is resulted by lower power allocation factor assigned to user D 2 . It is confirmed fairness among two NOMA users can be controlled by such power allocation coefficients. In addition, outage performance in OMA case is worse than that in NOMA for each destination.
The analytical and simulated outage probabilities for both OMA and NOMA case at two destinations in CR-D2DNOMA system are shown in Figure 3. The simulated parameters set as R 1 = 0.5 , R 2 = 2 for target rates, channel gains are λ D C = λ 1 = λ 2 = 10 , levels of imperfect SIC are λ D C i p = λ 2 i p = 0.01 . By increasing transmit power at the user D 2 D T x k or the R U , outage performance will be improved, and such outage probabilities remain stable at high transmit power P. Thus, it can be seen that the performance of the CR-D2DNOMA system can be improved significantly by a suitable transmit power design. Similarly, as previous experiment, Monte Carlo simulations are employed to confirm the analytical results. It is evident that the simulation curves match tight with the analytical curves. While Figure 4 indicated how strong channel gains make impacts on outage performance. It can be observed that λ D C = λ 1 = λ 2 = 20 ( d B ) provides better performance compared with another.
Impact of target rate R 1 , R 2 on outage behavior can be seen in Figure 5 and Figure 6, respectively. In this experiment, we set λ D C = λ 1 = λ 2 = 10 , λ p b = λ p 1 = λ p 2 = λ D C i p = λ 2 i p = 0.01 . It is confirmed that lower required target rate results in improved outage probability. The main reason is that expression of outage probability depends on achievable SINR and the threshold SINR while such SINR term is decided by the target rate. It is worth noting that outage performance gap among two destinations exist different power allocation factors assigned to such users.
Figure 7 further examines role of target rate R 1 . At low region of R 1 , outage performance of two destinations are at reasonable values, but outage happens at high regime of R 1 . In this case, interesting point is that OMA-based users achieve outage performance at high region of R 1 .
Figure 8 further evaluates outage performance of user D 2 as increasing R 2 . We set λ D C = λ 1 = λ 2 = 10 , λ p b = λ p 1 = λ p 2 = λ D C i p = λ 2 i p = 0.01 . As can be seen from the figure, user D 2 meets outage event at high target rate R 2 , outage performance of user D 1 in both NOMA mode and OMA mode does not change in this situation. In this case, higher value of P leads to better outage performance for all users.
Figure 9 exhibits optimal outage performance for user D 2 as increasing ε 1 in whole range. We set λ D C = λ 1 = λ 2 = 10 , λ p b = λ p 1 = λ p 2 = λ D C i p = λ 2 i p = 0.01 . In particular, best outage performance of user D 2 can be obtained at approximately ε 1 = 0.53 . As can be seen from the figure, user D 1 meets lowest outage performance at very high value of ε 1 . It can be explained that power allocation factor ε 1 results in varying SINR term and then outage probability of each user varies.

6. Conclusions

Cognitive radio and device-to-device, as two important technologies recommended for the forthcoming 5G networks, are studied in this paper to enhance the attainable system performance of secondary network under impact of interference from primary network. More source nodes are selected to serve best transmission on D2D link. Performance gap in terms of outage probability is reported by different power allocation factors assigned to two users. By exploiting numerical simulation, optimal outage performance of User D 2 can be achieved. This paper indicated that the considered system satisfies acceptable performance at specific target rates and levels of interference channels. Multiple users can be studied in extended work in future.

Author Contributions

D.-T.D. provided idea, wrote paper and verified expressions; M.-S.V.N. derived mathematical problems and performed experiments; B.M.L. contributed to prepare manuscript and delivered valuable comments.

Funding

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (Grant No.: NRF-2019R1A4A102374611) (Grant No.: NRF-2017R1D1A1B03028350).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Proposition 1.
A 1 can be computed by
A 1 = Pr ε 1 P g D k * C 2 ε 2 P g D k * C 2 + P h p b 2 + N 0 > γ 1 = Pr g D k * C 2 > γ 1 P h p b 2 + N 0 P ε 1 γ 1 ε 2 = 0 1 F g D k * C 2 γ 1 P x + N 0 P ε 1 γ 1 ε 2 f h p b 2 x d x .
Applying CDF and PDF, then A 1 is formulated as
A 1 = 0 k = 1 K K k 1 k 1 exp k γ 1 P x + N 0 P ε 1 γ 1 ε 2 λ D C 1 λ p b exp x λ p b d x = k = 1 K K k 1 k 1 P ε 1 γ 1 ε 2 λ D C k γ 1 P λ p b + P ε 1 γ 1 ε 2 λ D C exp k γ 1 N 0 P ε 1 γ 1 ε 2 λ D C .
A 2 is given by
A 2 = Pr ε 1 P g 1 2 ε 2 P g 1 2 + P h p 1 2 + N 0 > γ 1 = Pr g 1 2 > γ 1 P h p 1 2 + N 0 P ε 1 γ 1 ε 2 = 0 1 F g 1 2 γ 1 P x + N 0 P ε 1 γ 1 ε 2 f h p 1 2 x d x .
Similarly, computation of A 1 , by applying CDF and PDF it can be achieved A 2 as
A 2 = 0 exp γ 1 P x + N 0 P ε 1 γ 1 ε 2 λ 1 1 λ p 1 exp x λ p 1 d x = P ε 1 γ 1 ε 2 λ 1 γ 1 P λ p 1 + P ε 1 γ 1 ε 2 λ 1 exp γ 1 N 0 P ε 1 γ 1 ε 2 λ 1 .
Replacing A 1 , A 2 into (11), it completes the proof. □

Appendix B

Proof of Proposition 2.
It is noted that B 1 is rewritten as
B 1 = Pr ε 2 P g D k C 2 P h p b 2 + N 0 > γ 2 = Pr g D k * C 2 > γ 2 P h p b 2 + N 0 ε 2 P = 0 1 F g D k * C 2 γ 2 P x + N 0 ε 2 P f h p b 2 x d x .
To further compute on B 1 , it can be obtained following result
B 1 = 0 k = 1 K K k 1 k 1 exp k γ 2 P x + N 0 ε 2 P λ D C 1 λ p b exp x λ p b d x = k = 1 K K k 1 k 1 ε 2 P λ D C k γ 2 P λ p b + ε 2 P λ D C exp k γ 2 N 0 ε 2 P λ D C .
Similarly, B 2 can be expressed by
B 2 = Pr ε 2 P g 2 2 P h p 2 2 + N 0 > γ 2 = Pr g 2 2 > γ 2 P h p 2 2 + N 0 ε 2 P = 0 1 F g 2 2 γ 2 P x + N 0 ε 2 P f h p 2 2 x d x .
By exploiting related CDF and PDF, B 2 is further computed by
B 2 = 0 exp γ 2 P x + N 0 ε 2 P λ 2 1 λ p 2 exp x λ p 2 d x = ε 2 P λ 2 γ 2 P λ p 2 + ε 2 P λ 2 exp γ 2 N 0 ε 2 P λ 2 .
In next steps, B 3 can be formulated by
B 3 = P ε 1 γ 2 ε 2 λ 2 γ 2 P λ p 2 + P ε 1 γ 2 ε 2 λ 2 exp γ 2 N 0 P ε 1 γ 2 ε 2 λ 2 .
Plugging B 1 , B 2 , B 3 into (13), the final result can be obtained as in Proposition 2.
It is the end of the proof. □

Appendix C

Proof of Proposition 3.
First, C 1 can be computed as
C 1 = Pr ε 2 P g D k * C 2 ε 1 P h D k * C 2 + P h p b 2 + N 0 > γ 2 = Pr g D k * C 2 > γ 2 ε 1 P h D k * C 2 + P h p b 2 + N 0 ε 2 P = 0 0 1 F g D k * C 2 γ 2 ε 1 P x + P y + N 0 ε 2 P f h D k * C 2 x d x f h p b 2 y d y .
To achieve result, C 1 need be computed as
C 1 = 0 0 k = 1 K K k 1 k 1 exp k γ 2 ε 1 P x + P y + N 0 ε 2 P λ D C × t = 1 K K t 1 t 1 t λ D C i p exp t x λ D C i p d x 1 λ p b exp y λ p b d y = k = 1 K K k t = 1 K K t 1 k + t 2 exp k γ 2 N 0 ε 2 P λ D C 1 λ p b t λ D C i p 0 exp k γ 2 ε 1 ε 2 λ D C + t λ D C i p x d x 0 exp k γ 2 P ε 2 P λ D C + 1 λ p b y d y = k = 1 K K k t = 1 K K t 1 k + t 2 exp k γ 2 N 0 ε 2 P λ D C × t ε 2 λ D C k γ 2 ε 1 λ D C i p + t ε 2 λ D C × ε 2 P λ D C k γ 2 P λ p b + ε 2 P λ D C .
It can be rewritten C 2 as below
C 2 = Pr ε 2 P g 2 2 ε 1 P h 2 2 + P h p 2 2 + N 0 > γ 2 = Pr g 2 2 > γ 2 ε 1 P h 2 2 + P h p 2 2 + N 0 ε 2 P = 0 0 1 F g 2 2 γ 2 ε 1 P x + P y + N 0 ε 2 P f h 2 2 x d x f h p 2 2 y d y .
Then, C 2 is given by
C 2 = 0 0 exp γ 2 ε 1 P x + P y + N 0 ε 2 P λ 2 1 λ 2 i p exp x λ 2 i p d x 1 λ p 2 exp y λ p 2 d y = 1 λ 2 i p 1 λ p 2 exp γ 2 N 0 ε 2 P λ 2 0 exp γ 2 ε 1 ε 2 λ 2 + 1 λ 2 i p x d x 0 exp γ 2 P ε 2 P λ 2 + 1 λ p 2 y d y = ε 2 ε 2 P λ 2 λ 2 γ 2 ε 1 λ 2 i p + ε 2 λ 2 γ 2 P λ p 2 + ε 2 P λ 2 exp γ 2 N 0 ε 2 P λ 2 .
Plugging C 1 , C 2 , into (17), the final result can be obtained as in Proposition 3.
It is the end of the proof.  □

References

  1. Mitola, J. Cognitive radio for flexible mobile multimedia communications. Mob. Multimed. Commun. 2001, 6, 435–441. [Google Scholar]
  2. Liu, X.; Jia, M.; Zhang, X.; Lu, W. A Novel Multichannel Internet of Things Based on Dynamic Spectrum Sharing in 5G Communication. IEEE Internet Things 2019, 6, 5962–5970. [Google Scholar] [CrossRef]
  3. Liu, X.; Jia, M.; Gu, X.; Tan, X. Optimal periodic cooperative spectrum sensing based on weight fusion in cognitive radio networks. Sensors 2013, 13, 5251–5272. [Google Scholar] [CrossRef] [PubMed]
  4. Shen, J.; Liu, S.; Wang, Y.; Xie, G.; Rashvand, H.F.; Liu, Y. Robust energy detection in cognitive radio. IET Commun. 2009, 3, 1016–1023. [Google Scholar] [CrossRef]
  5. Choi, W.; Song, M.-G.; Ahn, J.; Im, G.-H. Soft combining for cooperative spectrum sensing over fast-fading channels. IEEE Commun. Lett. 2013, 18, 193–196. [Google Scholar] [CrossRef]
  6. Liu, X.; Jia, M.; Tan, X. Threshold optimization of cooperative spectrum sensing in cognitive radio networks. Radio Sci. 2013, 48, 23–32. [Google Scholar] [CrossRef]
  7. Liu, X.; Jia, M. Joint optimal fair cooperative spectrum sensing and transmission in cognitive radio. Phys. Commun. 2017, 25, 445–453. [Google Scholar] [CrossRef]
  8. Stotas, S.; Nallanathan, A. On the throughput and spectrum sensing enhancement of opportunistic spectrum access cognitive radio networks. IEEE Trans. Wirel. Commun. 2012, 11, 97–107. [Google Scholar] [CrossRef]
  9. Liu, X.; Tan, X. Optimization algorithm of periodical cooperative spectrum sensing in cognitive radio. Int. J. Commun. Syst. 2014, 27, 705–720. [Google Scholar] [CrossRef]
  10. Liu, X.; Zhang, X.; Jia, M.; Fan, L.; Lu, W.; Zhai, X. 5G-based green broadband communication system design with simultaneous wireless information and power transfer. Phys. Commun. 2018, 28, 130–137. [Google Scholar] [CrossRef]
  11. Liao, Y.; Wang, T.; Song, L.; Han, Z. Listen-and-talk: Protocol design and analysis for full-duplex cognitive radio networks. IEEE Trans. Veh. Technol. 2017, 66, 656–667. [Google Scholar] [CrossRef]
  12. Nam, P.-M.; Do, D.-T.; Nguyen, T.-T.; Tin, P.T. Energy harvesting assisted cognitive radio: random location-based transceivers scheme and performance analysis. Telecommun. Syst. 2018, 67, 123–132. [Google Scholar] [CrossRef]
  13. Nguyen, H.-S.; Do, D.-T.; Nguyen, T.-S.; Voznak, M. Exploiting hybrid time switching-based and power splitting-based relaying protocol in wireless powered communication networks with outdated channel state information. Automatika 2017, 58, 111–118. [Google Scholar] [CrossRef] [Green Version]
  14. Do, D.-T.; Van Nguyen, M.-S. Device-to-device transmission modes in NOMA network with and without Wireless Power Transfer. Comput. Commun. 2019, 139, 67–77. [Google Scholar] [CrossRef]
  15. Nguyen, T.-L.; Do, D.-T. Exploiting Impacts of Intercell Interference on SWIPT-assisted Non-orthogonal Multiple Access. Wirel. Commun. Mob. Comput. 2018, 2018, 2525492. [Google Scholar] [CrossRef]
  16. Do, D.-T.; Van Nguyen, M.-S.; Hoang, T.-A.; Voznak, M. NOMA-Assisted Multiple Access Scheme for IoT Deployment: Relay Selection Model and Secrecy Performance Improvement. Sensors 2019, 19, 736. [Google Scholar] [CrossRef]
  17. Lv, L.; Chen, J.; Ni, Q. Cooperative non-orthogonal multiple access in cognitive radio. IEEE Commun. Lett. 2016, 20, 2059–2062. [Google Scholar] [CrossRef]
  18. Ding, Z.; Fan, P.; Poor, H.V. Impact of user pairing on 5G non-orthogonal multiple access downlink transmissions. IEEE Trans. Veh. Technol. 2016, 65, 6010–6023. [Google Scholar] [CrossRef]
  19. Do, D.-T.; Le, A.-T.; Le, C.-B.; Lee, B.M. On Exact Outage and Throughput Performance of Cognitive Radio based Non-Orthogonal Multiple Access Networks with and without D2D Link. Sensors 2019, 19, 3314. [Google Scholar] [CrossRef]
  20. Do, D.-T.; Le, A.-T.; Lee, B.M. On Performance Analysis of Underlay Cognitive Radio-Aware Hybrid OMA/NOMA Networks with Imperfect CSI. Electronics 2019, 8, 819. [Google Scholar] [CrossRef]
  21. Van Nguyen, M.-S.; Do, D.-T.; Voznak, M. Improving Performance of Far Users in Cognitive Radio: Exploiting NOMA and Wireless Power Transfer. Energies 2019, 12, 2206. [Google Scholar] [CrossRef]
  22. Do, D.-T.; Van Nguyen, M.-S.; Hoang, T.-A.; Lee, B.M. Exploiting Joint Base Station Equipped Multiple Antenna and Full-Duplex D2D Users in Power Domain Division Based Multiple Access Networks. Sensors 2019, 19, 2475. [Google Scholar] [CrossRef] [PubMed]
  23. Lv, L.; Chen, J.; Ni, Q.; Ding, Z.; Jiang, H. Cognitive non-orthogonal multiple access with cooperative relaying: A new wireless frontier for 5G spectrum sharing. IEEE Commun. Mag. 2018, 56, 188–195. [Google Scholar] [CrossRef]
  24. Lee, S.; Duong, T.Q.; Costa, D.B.D.; Ha, D.B.; Nguyen, S.Q. Underlay cognitive radio networks with cooperative non-orthogonal multiple access. IET Commun. 2018, 56, 359–366. [Google Scholar] [CrossRef]
  25. Chu, T.M.C.; Zepernick, H.-J. Non-orthogonal multiple access for DF cognitive cooperative radio networks. In Proceedings of the 2018 IEEE International Conference on Communications Workshops (ICC Workshops), Kansas City, MO, USA, 20–24 May 2018. [Google Scholar]
  26. Yu, Z.; Zhai, C.; Liu, J.; Xu, H. Cooperative Relaying Based Non-Orthogonal Multiple Access (NOMA) With Relay Selection. IEEE Trans. Veh. Technol. 2018, 67, 11606–11618. [Google Scholar] [CrossRef]
  27. Jameel, F.; Wyne, S.; Nawaz, S.J.; Chang, Z.; Ristaniemi, T. Outage Analysis of Relay-Aided Non-Orthogonal Multiple Access with Partial Relay Selection. In Proceedings of the 2018 IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, United Arab Emirates, 9–13 December 2018. [Google Scholar]
  28. Do, D.-T.; Le, A.-T. NOMA based cognitive relaying: Transceiver hardware impairments, relay selection policies and outage performance comparison. Comput. Commun. 2019, 146, 144–154. [Google Scholar] [CrossRef]
  29. Nguyen, T.N.; Minh, T.H.Q.; Tran, P.T.; Voznak, M.; Duy, T.T.; Nguyen, T.-L.; Tin, P.T. Performance Enhancement for Energy Harvesting Based Two-Way Relay Protocols in Wireless Ad-hoc Networks with Partial and Full Relay Selection Methods. Ad-hoc Netw. 2019, 84, 178–187. [Google Scholar] [CrossRef]
  30. Lv, L.; Chen, J.; Ni, Q.; Ding, Z. Design of Cooperative Non-Orthogonal Multicast Cognitive Multiple Access for 5G Systems: User Scheduling and Performance Analysis. IEEE Trans. Commun. 2017, 65, 2641–2656. [Google Scholar] [CrossRef] [Green Version]
  31. Boccardi, F.; Heath, R.W.; Lozano, A.; Marzetta, T.L.; Popovski, P. Five disruptive technology directions for 5G. IEEE Commun. Mag. 2014, 52, 74–80. [Google Scholar] [CrossRef] [Green Version]
  32. Asadi, A.; Wang, Q.; Mancuso, V. A survey on device-to-device communication in cellular networks. IEEE Commun. Surveys Tuts. 2014, 52, 1801–1819. [Google Scholar] [CrossRef]
  33. Fodor, G.; Dahlman, E.; Mildh, G.; Parkvall, S.; Reider, N.; Miklos, G.; Turanyi, Z. Design aspects of network assisted device-to-device communications. IEEE Commun. Mag. 2012, 50, 170–177. [Google Scholar] [CrossRef]
  34. Lin, X.; Andrews, J.G.; Ghosh, A. Spectrum sharing for deviceto-device communication in cellular networks. IEEE Trans. Wirel. Commun. 2014, 13, 6727–6740. [Google Scholar] [CrossRef]
  35. Ma, C.; Wu, W.; Cui, Y.; Wang, X. On the performance of successive interference cancellation in D2D-enabled cellular networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Kowloon, Hong Kong, China, 26 April–1 May 2015. [Google Scholar]
  36. Kim, J.; Lee, I.; Lee, J. Capacity Scaling for D2D Aided Cooperative Relaying Systems Using NOMA. IEEE Wirel. Commun. Lett. 2018, 7, 42–45. [Google Scholar] [CrossRef]
  37. Chen, J.; Jia, J.; Liu, Y.; Wang, X.; Aghvami, A.H. Optimal Resource Block Assignment and Power Allocation for D2D-Enabled NOMA Communication. IEEE Access 2019, 7, 90023–90035. [Google Scholar] [CrossRef]
  38. Im, G.; Lee, J.H. Outage Probability for Cooperative NOMA Systems with Imperfect SIC in Cognitive Radio Networks. IEEE Commun. Lett. 2019, 23, 692–695. [Google Scholar] [CrossRef]
  39. Liu, J.; Kato, N.; Ma, J.; Kadowaki, N. Device-to-Device Communication in LTE-Advanced Networks: A Survey. IEEE Commun. Surv. Tutor. 2015, 27, 1923–1940. [Google Scholar] [CrossRef]
Figure 1. D2D transmission in CR-inspired NOMA.
Figure 1. D2D transmission in CR-inspired NOMA.
Sensors 19 04840 g001
Figure 2. Comparison study on OP of NOMA and OMA versus P as changing K ( R 1 = 0.5 , R 2 = 2 , N 0 = 1 ).
Figure 2. Comparison study on OP of NOMA and OMA versus P as changing K ( R 1 = 0.5 , R 2 = 2 , N 0 = 1 ).
Sensors 19 04840 g002
Figure 3. Comparison study on OP of NOMA and OMA versus P as changing λ p b = λ p 1 = λ p 2 ( ε 1 = 0.8 , K= 3, N 0 = 1 ).
Figure 3. Comparison study on OP of NOMA and OMA versus P as changing λ p b = λ p 1 = λ p 2 ( ε 1 = 0.8 , K= 3, N 0 = 1 ).
Sensors 19 04840 g003
Figure 4. Comparison study on OP of NOMA and OMA versus P as changing λ D C = λ 1 = λ 2 ( ε 1 = 0.8 , R 1 = 0.5 , R 2 = 2 , λ p b = λ p 1 = λ p 2 = λ D C i p = λ 2 i p = 0.01 , K= 3, N 0 = 1 ).
Figure 4. Comparison study on OP of NOMA and OMA versus P as changing λ D C = λ 1 = λ 2 ( ε 1 = 0.8 , R 1 = 0.5 , R 2 = 2 , λ p b = λ p 1 = λ p 2 = λ D C i p = λ 2 i p = 0.01 , K= 3, N 0 = 1 ).
Sensors 19 04840 g004
Figure 5. Comparison study on OP of NOMA and OMA versus P as changing R 1 ( ε 1 = 0.8 , R 2 = 2 , K= 3, N 0 = 1 ).
Figure 5. Comparison study on OP of NOMA and OMA versus P as changing R 1 ( ε 1 = 0.8 , R 2 = 2 , K= 3, N 0 = 1 ).
Sensors 19 04840 g005
Figure 6. Comparison study on OP of NOMA and OMA versus P as changing R 2 ( ε 1 = 0.8 , R 1 = 0.5 , λ D C = λ 1 = λ 2 = 10 , λ p b = λ p 1 = λ p 2 = λ D C i p = λ 2 i p = 0.01 , K= 3, N 0 = 1 ).
Figure 6. Comparison study on OP of NOMA and OMA versus P as changing R 2 ( ε 1 = 0.8 , R 1 = 0.5 , λ D C = λ 1 = λ 2 = 10 , λ p b = λ p 1 = λ p 2 = λ D C i p = λ 2 i p = 0.01 , K= 3, N 0 = 1 ).
Sensors 19 04840 g006
Figure 7. Comparison study on OP of NOMA and OMA versus R 1 as changing P ( ε 1 = 0.8 , R 2 = 2 , λ D C = λ 1 = λ 2 = 10 , λ p b = λ p 1 = λ p 2 = λ D C i p = λ 2 i p = 0.01 , K= 3, N 0 = 1 ).
Figure 7. Comparison study on OP of NOMA and OMA versus R 1 as changing P ( ε 1 = 0.8 , R 2 = 2 , λ D C = λ 1 = λ 2 = 10 , λ p b = λ p 1 = λ p 2 = λ D C i p = λ 2 i p = 0.01 , K= 3, N 0 = 1 ).
Sensors 19 04840 g007
Figure 8. Comparison study on OP of NOMA and OMA versus R 2 as changing P ( ε 1 = 0.8 , R 1 = 0.5 , K= 3, N 0 = 1 ).
Figure 8. Comparison study on OP of NOMA and OMA versus R 2 as changing P ( ε 1 = 0.8 , R 1 = 0.5 , K= 3, N 0 = 1 ).
Sensors 19 04840 g008
Figure 9. Comparison study on OP of NOMA and OMA versus ε 1 as changing P ( R 1 = 0.5 , R 2 = 2 , K= 3, N 0 = 1 ).
Figure 9. Comparison study on OP of NOMA and OMA versus ε 1 as changing P ( R 1 = 0.5 , R 2 = 2 , K= 3, N 0 = 1 ).
Sensors 19 04840 g009

Share and Cite

MDPI and ACS Style

Do, D.-T.; Nguyen, M.-S.V.; Lee, B.M. Outage Performance Improvement by Selected User in D2D Transmission and Implementation of Cognitive Radio-Assisted NOMA. Sensors 2019, 19, 4840. https://doi.org/10.3390/s19224840

AMA Style

Do D-T, Nguyen M-SV, Lee BM. Outage Performance Improvement by Selected User in D2D Transmission and Implementation of Cognitive Radio-Assisted NOMA. Sensors. 2019; 19(22):4840. https://doi.org/10.3390/s19224840

Chicago/Turabian Style

Do, Dinh-Thuan, Minh-Sang Van Nguyen, and Byung Moo Lee. 2019. "Outage Performance Improvement by Selected User in D2D Transmission and Implementation of Cognitive Radio-Assisted NOMA" Sensors 19, no. 22: 4840. https://doi.org/10.3390/s19224840

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop