Next Article in Journal
Comparison of Training Strategies for Autoencoder-Based Monochromatic Image Denoising
Next Article in Special Issue
Massive MIMO NOMA: Double-Mode Model towards Green 5G Networks
Previous Article in Journal
Trip-Related Fall Risk Prediction Based on Gait Pattern in Healthy Older Adults: A Machine-Learning Approach
Previous Article in Special Issue
DNS for IoT: A Survey
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Exploiting User Clustering and Fixed Power Allocation for Multi-Antenna UAV-Assisted IoT Systems

1
Science and Technology Application for Sustainable Development Research Group, Ho Chi Minh City University of Transport, Ho Chi Minh City 700000, Vietnam
2
Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City 700000, Vietnam
3
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh City 700000, Vietnam
4
Data Science Laboratory, Faculty of Information Technology, Ton Duc Thang University, Ho Chi Minh City 700000, Vietnam
5
Department of Data Science, Korea National University of Transportation (KNUT), Uiwang-si 16106, Gyeonggi-do, Republic of Korea
*
Authors to whom correspondence should be addressed.
Sensors 2023, 23(12), 5537; https://doi.org/10.3390/s23125537
Submission received: 20 April 2023 / Revised: 1 June 2023 / Accepted: 11 June 2023 / Published: 13 June 2023

Abstract

:
Internet of Things (IoT) systems cooperative with unmanned aerial vehicles (UAVs) have been put into use for more than ten years, from transportation to military surveillance, and they have been shown to be worthy of inclusion in the next wireless protocols. Therefore, this paper studies user clustering and the fixed power allocation approach by placing multi-antenna UAV-mounted relays for extended coverage areas and achieving improved performance for IoT devices. In particular, the system enables UAV-mounted relays with multiple antennas together with non-orthogonal multiple access (NOMA) to provide a potential way to enhance transmission reliability. We presented two cases of multi-antenna UAVs such as maximum ratio transmission and the best selection to highlight the benefits of the antenna-selections approach with low-cost design. In addition, the base station managed its IoT devices in practical scenarios with and without direct links. For two cases, we derive closed-form expressions of outage probability (OP) and closed-form approximation ergodic capacity (EC) generated for both devices in the main scenario. The outage and ergodic capacity performances in some scenarios are compared to confirm the benefits of the considered system. The number of antennas was found to have a crucial impact on the performances. The simulation results show that the OP for both users strongly decreases when the signal-to-noise ratio (SNR), number of antennas, and fading severity factor of Nakagami-m fading increase. The proposed scheme outperforms the orthogonal multiple access (OMA) scheme in outage performance for two users. The analytical results match Monte Carlo simulations to confirm the exactness of the derived expressions.

1. Introduction

In recent years, unmanned aerial vehicles (UAVs) have been studied and recommended for possible applications in the Internet of Things (IoT) due to their prominent features related to low-cost implementation and high flexibility [1,2,3,4,5]. As one of the effective system models, a UAV-mounted relay can be easily employed, since it provides a flexible coverage area in comparison with conventional fixed relays and increases the network capacity [6]. For UAV-enabled/assisted ground communications, a UAV relay could be a wirelessly-powered device since it harvests energy from the radio signals received from a nearby base station to improve energy efficiency (EE) [7]. The authors in [7] presented the closed-form expressions to showcase two main system performance metrics such as ergodic capacity and outage behavior by enabling both amplify-and-forward (AF) and decode-and-forward (DF) relaying protocols. In [8], the authors examined the case of the UAV carrying limited energy concerning optimal power allocation. They considered the problem of flying path optimization while the UAV is allowed to fly flexibly. To enhance energy-harvesting efficiency and data collection, the communication time and the distances between the access point and ground devices are optimized.
UAVs combined with cooperative non-orthogonal multiple access (NOMA) were considered as a further version of NOMA, which enables the simultaneous transmission among multiple links using the same frequency, can increase bandwidth utilization by carefully planning the communication resource, and increases the dependability of UAV relaying systems in emergency communications [9]. In UAV-NOMA, the far user is assisted by the near user in forwarding the signal from the base station (BS), and the forwarding process occurs in cases where the transmitted signal cannot reach the far user due to obstacles or a long-distance and poor channel condition between the BS and this user [10,11,12,13]. The near user is known as a relay in cooperative non-orthogonal multiple access (C-NOMA). Thus, the C-NOMA can cover a larger area than NOMA, and its transmission reliability is also improved.
To extend the operating areas of the UAV, one can implement a relaying network [14,15,16,17,18,19]. The relays with a single antenna have been studied by many researchers in the last decade [18,19]. Although the structure of these relays is simple, their performance is lower than the relay with multiple antennas due to its low degree of freedom [20,21]. Furthermore, multiple-antenna technology can powerfully mitigate interference [22]. In [23], the authors studied a two-user C-NOMA system in which a decode-and-forward (DF) relay was equipped with multiple antennas. In [21], a NOMA system aided by multiple-antennae two-way DF relay was investigated to boost the transmission reliability of the system. The authors derived closed-form expressions for the outage probability and diversity to show the system performance. In [24], an AF/DF relay was exploited in a C-NOMA system with two users where these two users were equipped with multiple antennas. The effect of multiple antennas on the performance of the relay was examined also. In [25], a multiple-antenna downlink NOMA system for multi-user communication is considered. The transmit power and number of feedback bits were the two main optimized parameters to exploit the potential of multiple-antenna techniques. In [26], a C-NOMA system that employed multiple-antenna two-way relays is studied. Two broadcast NOMA strategies based on multiple access and time division were proposed to enhance transmission reliability. To evaluate the system performance, closed-form expressions were derived for the outage probability and diversity order corresponding with joint antenna-and-relay selection solutions in the proposed strategies. In [27,28], a combination of the C-NOMA scheme and multiple antennas is also analyzed. In [27], the AF relay is equipped with a single antenna, while the source and users are served by multiple antennas. Two antenna-relay selection schemes, namely the maximum ratio transmission (MRT) and transmit antenna selection (TAS), were considered and compared to the random selection (RS) scheme. Based on the numerical simulation results, the performance in terms of outage probability and throughput for MRT and TAS was superior to that for RS. In [29], a full-duplex (FD) multi-antenna relay was employed in a C-NOMA system to assist the communication between BS and a set of far users. The performance of the system for the multiple-antenna relay was significantly improved as compared to that for the half-duplex relay. In [30], multiple antennas at the satellite were exploited with the C-NOMA system. The authors presented an iterative penalty function-based beamforming (BF) scheme to optimize the sum rate. The authors in [31] studied the BF schemes in the multiple-antennas system to maximize the achievable secrecy-energy efficiency. In [32], a cooperative multiple-antenna relaying system was employed where a BF was considered to minimize the total transmit power. In [33], a multiple-antennas UAV network with rate-splitting multiple access was considered. The authors designed the optimization problem to maximize the sum rate of our system. In addition, Table 1 summarizes the related work.
Although [25,26,27,28,29,30,31,32,33] studied the benefits of the multi-antenna approach to enhancing performance at destinations of a wireless system, it is still a crucial problem for in-depth analysis to provide more guidelines in the design of effective antenna selection for UAV-aided IoT systems in practice. The main contributions of this paper are summarized as follows
  • We provide two practical scenarios of the multi-antenna relay to evaluate a UAV-aided IoT system that can be implemented while the system still leverages the advantage of a multi-antenna UAV. Compared with the traditional multiple input multiple output (MIMO) techniques, we prefer the antenna selection approach to reduce the cost of design and the complexity of signal processing. While Figure 1 exhibits the way that the relay leverages Maximum Ratio Transmission for signal transmission, the antenna-selection approach in Figure 2 inherently enjoys the merits of reducing hardware complexity and cost.
  • Nakagami-m fading is suitable for characterizing a wide class of fading channel conditions for UAV links. Therefore, we focus on UAVs with the analysis of the Nakagami-m fading model rather than Rayleigh’s fading model, which was applied in lots of previous studies. In addition, the two-user scenario of NOMA needs to evaluate the performance when the fixed power allocation is adopted. To confirm the superiority of those schemes, the closed-form expressions for the outage probability and closed-form approximation of the ergodic capacity are derived.
  • The outage probability for the multiple-antenna UAV is compared in cases with/ without direct links, NOMA, and OMA to evaluate the effectiveness of the UAV equipped with multiple antennas. We investigate the impacts of the transmit signal-to-noise ratio (SNR) and the number of antennas on the outage probability and ergodic capacity. From these results, one can choose a suitable number of antennas and SNR threshold to balance the demand for performance and the cost of design.
The rest of this paper is organized as follows. Section 2 institutes the system model. In Section 3 and Section 4, the closed-form outage probability is derived for Figure 1 and Figure 2, respectively. Section 5 and Section 6 show the ergiduc capacity analysis for Figure 1 and Figure 2, respectively. Section 7 shows simulation results. Finally, conclusions are drawn in Section 8.
Notation: Vectors are symbolized by bold-faced letters, e.g., x, . F specifies the Frobenius norm, . T and . H denote the normal and Hermitian transpose, respectively; Pr . denotes the probability operator; E . is the Expectation operator; K n . is the so-called Bessel function; the probability density function (PDF) and the cumulative distribution function (CDF) of a random variable X are represented as F X . and f X . , respectively.

2. System Model

We consider a downlink multiple-antenna UAV-aided IoT system, as shown in Figure 1. In this scenario, a base station (BS) wants to transfer the information to K users, in which two users in the group are located in separated clusters. The user U k could be a strong user or a weak user ( k = 1 , 2 , 3 , , K ). The BS works with different frequencies assigned to these clusters following OMA. To evaluate the performance of a particular cluster, we refer to the strong user U 1 and the weak user U 2 with the help of an AF-based UAV (R), as illustrated in Figure 1. It is noted that the multiple users served by B S are divided into many groups, and each group contains two users. In addition, the BS and two users are equipped with a single antenna, and the UAV (relay) R is equipped with N antennas. In the IoT system, multiple-input multiple-output (MIMO) techniques can be employed to mitigate the detrimental effects of unavoidable fading when the base station uses multiple antennas for transmitting and receiving signals. Although using the MIMO technique could be a promising way to improve the capacity and system performance, the transceivers need multiple radio frequency (RF) chains leading to higher power consumption and higher hardware complexity. In this article, we design antenna selection (AS) schemes applied at the BS to reduce the number of RF chains and still maintain the advantages of MIMO systems. Perfect channels state information (CSI) is assumed to be available at the BS. In addition, we assume that the fading channels are distributed over Nakagami-m channels, which are usually characterized by channels connected to UAV.
The channel coefficients between B S and R are denoted by the 1 × N matrix h R = h R 1 , h R 2 , , h R N where each element h R n with fading parameter m R is called independent and identically distributed (i.i.d.), and the expectation E h R n 2 = λ R width n 1 , 2 , , N . Likewise, the channel coefficients between R and two users U i , i 1 , 2 are denoted by the N × 1 matrix h R U i = h R U i 1 , h R U i 2 , , h R U i N in which each element h R U i n is also i.i.d. and fulfills E h R U i n 2 = λ R U i n N with fading value m R U i . Finally, the direct connection channel coefficients between BS and U i are given by h U i Nakagami m U i , λ U i , where m U i is the corresponding distribution parameter and E h U i 2 = λ U i [39].
Following the NOMA principle and in order to provide more user fairness, we assume that h U 2 2 > h U 1 2 , a 2 > a 1 with a 1 and a 2 are the power allocation coefficients and a 1 + a 2 = 1 [40,41]. In this article, we just focus on the analysis of two users located in a particular cluster and assume the performance at other clusters is similar. The BS transmits the superposition coding signal, which is combined by two signals x 1 and x 2 to R and two users in phase 1. The expectations of signals x 1 and x 2 are assumed that E x 1 2 = E x 2 2 = 1 in which E . is called the expected operator. Hence, the transmitted signal expression at B S is given by
x ¯ = i = 1 2 a i P S x i ,
where x 1 and x 2 are the messages for U 1 and U 2 , respectively. We assume that n R , n R U i , n U i denotes the additive white Gaussian noise (AWGN) with mean power N 0 .

3. The Outage Performance of Figure 1

The received signals at U 1 , U 2 and R are, respectively, given by
y U i = h U i x ¯ + n U i = h U i a 1 P S x 1 + a 2 P S x 2 + n U i i 1 , 2 ,
and
y R = h R v R H x ¯ + n R = h R h R H h R F a 1 P S x 1 + a 2 P S x 2 + n R ,
where P S is the transmit power and v R C N × 1 is the receive beamforming vector at the R. By employing the maximum ratio combining (MRC) scheme, each user U 1 and U 2 employs the normalized vector v R as v R = h R H h R F in [42].
In the second phase, R transmits the signal x R = G ¯ y R to both U 1 and U 2 , where G ¯ denotes the amplifying gain at relay, i.e.,
G ¯ = P R P R h R 2 + N 0 ,
where P R denotes the transmit power of the relay. Without loss of generality, we assume that the transmit power at R is equal to the transmit power of the BS, i.e., P R = P S = P . Therefore, the received signals at U i (forwarded by R) are given by [43]:
y R U i = h R U i k i x R + n R U i = G ¯ h R U i k i h R h R H h R F a 1 P S x 1 + G ¯ h R U i k i h R n h R H h R F a 2 P S x 2 + G ¯ h R U i k i n R + n R U i . , i 1 , 2
By employing the Maximum Ratio Transmission (MRT) scheme, the relay obtains the following beamforming vector k i N × 1 to steer the signal in the direction of two users U 1 and U 2 with k i = h R U i T H h R U i T F in [42,44].
To calculate the instantaneous signal-to-interference-plus-noise ratio (SINR) of the two phases, let us define the average transmit SNR, ρ = P N 0 and the random variables (RVs) X i = h U i 2 , where Y = h R F 2 and Z i = h R U i F 2 represent the instantaneous S N R s of the links S U i , S R and R U i , respectively.
There are two phases of signal processing in the NOMA system. In the first phase, other signal components are treated as interference by U 2 while decoding their own message x 2 . The SINR is used to decode the signal x 2 with a direct link given by
γ U 2 = a 2 ρ X 2 a 1 ρ X 2 + 1 .
Similarly, the instantaneous SINR at U 1 to detect x 2 is given as
γ U 2 U 1 = a 2 ρ X 1 a 1 ρ X 1 + 1 .
After SIC, we assume the perfect SIC is at the receiver side. Therefore, the received SNR at U 1 to detect its own message x 1 is written as
γ U 1 = a 1 ρ X 1 .
In the second phase, the instantaneous SINR at U 2 relating to link R U 2 is calculated by applying the same procedure as the first phase and is thus given by
γ R U 2 , x 2 = a 2 ρ 2 Y Z 2 a 1 ρ 2 Y Z 2 + ρ Y + ρ Z 2 + 1 .
Considering the link R U 1 , the instantaneous SINR at U 1 to detect x 2 and the instantaneous SNR at U 1 to detect its own data x 1 are, respectively, given by
γ R U 1 , x 2 = a 2 ρ 2 Y Z 1 a 1 ρ 2 Y Z 1 + ρ Y + ρ Z 1 + 1 ,
and
γ R U 1 , x 1 = a 1 ρ 2 Y Z 1 ρ Y + ρ Z 1 + 1 .
Based on the selection combination, the instantaneous SINRs at U 2 and U 1 could be given as [45]
γ ¯ U 2 = max γ U 2 , γ R U 2 , x 2 ,
γ ¯ U 1 = max γ U 1 , γ R U 1 , x 1 .
Based on the quality of service of two users, their target SINRs can be determined. Each user has its own the SNR threshold, ε t h i = 2 2 R i 1 , i 1 , 2 where R 1 is the target rate at U 1 to detect x 1 and R 2 is the target rate at U 1 to detect x 2 . For simplicity, we assume the SNR thresholds of U 2 and U 1 are both equal, i.e., ε t h 1 = ε t h 2 = ε t h .

3.1. Outage Probability at U 2

According to [46,47], the cumulative distribution functions (CDF) of the RVs X i , Y and Z i , respectively, are given by
F X i x = 1 e μ U i x t = 0 m U i 1 μ U i t x t t ! , i 1 , 2 ,
F Y x = 1 e μ R x t = 0 m R N 1 μ R t x t t ! ,
F Z i x = 1 e μ R U i x t = 0 m R U i N 1 μ R U i t x t t ! , i 1 , 2 ,
and the probability density function (PDF) of the RVs X i , Y and Z i , respectively, are given by
f X i x = μ U i m U i x m U i 1 Γ m U i e μ U i x , i 1 , 2 ,
f Y x = μ R m R N x m R N 1 Γ m R N e μ R x ,
f Z i x = μ R U i m R U i N x m R U i N 1 e μ R U i x Γ m R U i N , i 1 , 2 ,
where μ U i = m U i λ U i , μ R = m R λ R and μ R U i = m R U i λ R U i are the parameters of multipath fading associated with h U i 2 , h R F 2 and h R U i F 2 , respectively.
Then, the outage probability at U 2 can be given by
P ¯ 2 I = Pr γ ¯ U 2 < ε t h = Pr max γ U 2 , γ R U 2 , x 2 < ε t h = A ¯ 1 × A ¯ 2 .
where A ¯ 1 = Pr γ U 2 < ε t h and A ¯ 2 = Pr γ R U 2 , x 2 < ε t h .
Proposition 1.
The closed-form expression of the outage probability at user U 2 can be given by
P ¯ 2 I = 1 e μ U 2 θ a = 0 m U 2 1 μ U 2 a θ a a ! 1 2 b = 0 m R N 1 q = 0 b n = 0 m R U 2 N 1 × 2 b q m R U 2 N 1 n θ 2 + θ ρ 1 q e θ μ R U 2 + μ R b ! Γ m R U 2 N × μ R b θ m R U 2 N + b q n 1 μ R θ 2 + θ ρ 1 μ R U 2 n q + 1 2 × μ R U 2 m R U 2 N K n q + 1 2 μ R μ R U 2 θ 2 + θ ρ 1 .
where θ = ε t h ρ a 2 a 1 ε t h .
Proof of Proposition 1, see Appendix A.

3.2. Outage Probability at U 1

Similarly, the outage probability at user U 1 can be computed by
P ¯ 1 I = Pr γ ¯ U 1 < ε t h = Pr max γ U 1 , γ R U 1 , x 1 < ε t h = Pr γ U 1 < ε t h B ¯ 1 × Pr γ R U 1 , x 1 < ε t h B ¯ 2
Proposition 2.
The closed-form expression of the outage probability at user U 1 can be computed by
P ¯ 1 I = 1 e μ U 1 φ t = 0 m U 1 1 μ U 1 t φ t t ! 1 2 k = 0 m R N 1 r = 0 k d = 0 m R U 1 N 1 × k r m R U 1 N 1 d φ + ρ 1 r e φ μ R U 1 + μ R k ! Γ m R U 1 N × μ R k φ m R U 1 N + k d 1 μ R φ 2 + φ ρ 1 μ R U 1 d r + 1 2 × μ R U 1 m R U 1 N K d r + 1 2 μ R μ R U 1 φ 2 + φ ρ 1 ,
where φ = ε t h a 1 ρ
Proof. 
Here, B ¯ 1 is calculated as
B ¯ 1 = Pr γ U 1 < ε t h = Pr X 1 < ε t h a 1 ρ = F X 1 ε t h a 1 ρ = 1 e μ U 1 φ t = 0 m U 1 1 μ U 1 t φ t t ! .
Next, B ¯ 2 is calculated as
B ¯ 2 = Pr γ R U 1 , x 1 < ε t h = 1 Pr Y > φ Z 1 + ρ 1 Z 1 φ , Z 1 > φ = 1 φ f Z 1 x 1 F Y φ x + ρ 1 x φ d x = 1 k = 0 m R N 1 μ R U 1 m R U 1 N μ R k k ! Γ m R U 1 N φ x m R U 1 N 1 e μ R U 1 x × e μ R φ x + ρ 1 x φ φ x + ρ 1 x φ k d x .
Let t = x φ t + φ = x d t = d x , B ¯ 2 be given as
B ¯ 2 = 1 k = 0 m R N 1 μ R U 1 m R U 1 N μ R k k ! Γ m R U 1 N 0 t + φ m R U 1 N 1 e μ R U 1 t + φ × e μ R φ t + φ + ρ 1 t φ t + φ + ρ 1 t k d t = 1 k = 0 m R N 1 μ R U 1 m R U 1 N μ R k e φ μ R U 1 + μ R k ! Γ m R U 1 N × 0 t + φ m R U 1 N 1 e μ R φ φ + ρ 1 t μ R U 1 t × φ t + φ + ρ 1 t k d t .
With the help of Equations (1.111), (3.471.9) [48] and after some manipulations, we have
B ¯ 2 = 1 2 k = 0 m R N 1 r = 0 k d = 0 m R U 1 N 1 k r m R U 1 N 1 d × μ R k φ m R U 1 N + k d 1 e φ μ R U 1 + μ R k ! Γ m R U 1 N × μ R U 1 m R U 1 N φ + ρ 1 r μ R φ 2 + φ ρ 1 μ R U 1 d r + 1 2 × K d r + 1 2 μ R μ R U 1 φ 2 + φ ρ 1 .
Substituting (22) and (19) into (17), the expression of (18) can be obtained. □
Remark 1.
Although derivations of outage behavior are complicated, we still realize that channel parameters and the number of transmit antennas can be the main factors affecting the system performance. For example: in (18), the outage behavior relies on m, N.

4. The Outage Performance of Figure 2: Separated Antenna Selection Approach

In Figure 2, each user follows the antenna selection scheme itself. This way, the performance of each user can be maximized as expected. We will present how Figure 2 is different from Figure 1 in terms of outage performance. In addition, Figure 3 shows the block diagram of the antenna selection for Figure 2. We assume the MRC method from BS to R and the optimal antenna from R to two users by the transmit antenna selection method.
By employing the antenna-selection technique for separated users, the received signal at each U i is first written as
y R U i n = G ¯ h R U i n y R + n R U i n = G ¯ h R U i n h R h R H h R F a 1 P S x 1 + G ¯ h R U i n h R n h R H h R F a 2 P S x 2 + G ¯ h R U i n n R + n R U i n . , i 1 , 2

4.1. Best Antenna Serving U 1

In this case, the BS selects the ideal antenna to obtain the highest performance at U 1 . When U 2 performance is assured owing to greater normalized channel gain and the source chooses an appropriate antenna to serve U 1 , this method can maximize the system’s performance. The chosen antenna, represented by n 1 * , may therefore be written as
n 1 * = arg max n = 1 , 2 , , N h R U 1 n 2 .
According to (23), the equivalent instantaneous end-to-end SINR of U 1 can be written as
γ ¯ R U 1 , x 2 n * = a 2 ρ 2 Y Z ¯ 1 n * a 1 ρ 2 Y Z ¯ 1 n * + ρ Y + ρ Z ¯ 1 n * + 1 ,
and
γ ¯ R U 1 , x 1 n * = a 1 ρ 2 Y Z ¯ 1 n * ρ Y + ρ Z ¯ 1 n * + 1 ,
where Z ¯ i n * = h R U i n * 2 with i 1 , 2 .
In addition, the PDF and CDF of Z ¯ i n * can be re-expressed as
f Z ¯ i n * x = N μ R U i m R U i x m R U i 1 e μ R U i x m R U i 1 ! × 1 e μ R U i x t = 0 m R U i 1 μ R U i t x t t ! N 1 = N μ R U i m R U i x m R U i 1 e μ R U i x m R U i 1 ! × a = 0 N 1 N 1 a 1 a e μ R U i a x j 0 + + j m R U i 1 = a × a j 0 , , j m R U i 1 b = 0 m R U i 1 μ R U i b x b b ! j b ,
and
F Z ¯ i n * x = 1 e μ R U i x t = 0 m R U i 1 μ R U i t x t t ! N = a = 0 N N a 1 a e μ R U i a x j 0 + + j m R U i 1 = a × a j 0 , , j m R U i 1 b = 0 m R U i 1 μ R U i b x b b ! j b .
From (25) and (26), we can write the expression of P 1 I I as in (29)
P ¯ 1 I I = Pr min γ ¯ R U 1 , x 2 n * , γ ¯ R U 1 , x 1 n * < ε t h = 1 Pr γ ¯ R U 1 , x 2 n * > ε t h , γ ¯ R U 1 , x 1 n * > ε t h = 1 Pr a 2 ρ 2 Y Z ¯ 1 n * a 1 ρ 2 Y Z ¯ 1 n * + ρ Y + ρ Z ¯ 1 n * + 1 > ε t h , a 1 ρ 2 Y Z ¯ 1 n * ρ Y + ρ Z ¯ 1 n * + 1 > ε t h = 1 Pr Y Z ¯ 1 n * > ε t h ρ 2 a 2 ε t h a 1 ρ Y + ρ Z ¯ 1 n * + 1 , Y Z ¯ 1 n * > ε t h a 1 ρ 2 ρ Y + ρ Z ¯ 1 n * + 1 = 1 Pr Y Z ¯ 1 n * > θ max ρ Y + ρ Z ¯ 1 n * + 1
where θ 1 = ε t h a 1 ρ 2 , θ 2 = ε t h ρ 2 a 2 ε t h a 1 and θ max = max θ 1 , θ 2 .
Proposition 3.
The approximated closed-form expressions of the outage probability for U 2 with Figure 2 is given by
P ¯ 1 I I = 1 μ R m R N e μ R θ max ρ Γ m R N q = 0 m R N 1 m R N 1 q × θ max ρ m R N q 1 q ! μ R q + 1 a = 0 N N a 1 a × e μ R U 1 a θ max ρ j 0 + + j m R U 1 1 = a a j 0 , , j m R U 1 1 × b = 0 m R U 1 1 μ R U 1 b b ! j b c = 0 b j b b j b c θ max θ max ρ 2 + 1 c × θ max ρ b j b c 2 μ R U 1 a θ max θ max ρ 2 + 1 μ R q c + 1 2 × K q c + 1 2 μ R μ R U 1 a θ max θ max ρ 2 + 1 .
Proof of Proposition 3, see Appendix B.

4.2. Best Antenna Serving U 2

The source BS will select the ideal antenna in Figure 2 to get the highest performance dedicated to U 2 . When the U 1 performance is uncertain owing to high interference levels and/or unfavorable channel conditions, this method can maximize the system’s performance. The source then favors a suitable antenna to serve U 2 . The chosen antenna, represented by n 2 * , may be written as
n 2 * = arg max n = 1 , 2 , , N h R U 2 n 2 .
Thus, the received SINR at U 2 to detect x 2 is given by
γ ¯ R U 2 , x 2 n * = a 2 ρ 2 Y Z ¯ 2 n * a 1 ρ 2 Y Z ¯ 2 n * + ρ Y + ρ Z ¯ 2 n * + 1 .
The outage probability of U 2 for AF-NOMA is
P ¯ 2 I I = 1 Pr γ ¯ R U 2 , x 2 n * > ε t h = 1 Pr a 2 ρ 2 Y Z ¯ 2 n * a 1 ρ 2 Y Z ¯ 2 n * + ρ Y + ρ Z ¯ 2 n * + 1 > ε t h = 1 Pr Y Z ¯ 2 n * > θ 2 ρ Y + ρ Z ¯ 2 n * + 1 .
Similarly, by solving P 1 I I , P 2 I I can be obtained as
P ¯ 2 I I = 1 μ R m R N e μ R θ 2 ρ Γ m R N q = 0 m R N 1 m R N 1 q × θ 2 ρ m R N q 1 q ! μ R q + 1 a = 0 N N a 1 a × e μ R U 2 a θ 2 ρ j 0 + + j m R U 2 1 = a a j 0 , , j m R U 2 1 × b = 0 m R U 2 1 μ R U 2 b b ! j b c = 0 b j b b j b c θ 2 θ 2 ρ 2 + 1 c × θ 2 ρ b j b c 2 μ R U 2 a θ 2 θ 2 ρ 2 + 1 μ R q c + 1 2 × K q c + 1 2 μ R μ R U 2 a θ 2 θ 2 ρ 2 + 1 .
Although the design of Figure 2 costs less, the system working with Figure 1 still provides higher diversity characterization. We pay attention to examining other system performance metrics, i.e., ergodic capacity.

5. Figure 1: Ergodic Capacity Analysis

We first define the EC of U 2 below
C 2 ¯ = E 1 2 log 2 1 + max γ U 2 , γ R U 2 , x 2 .
Proposition 4.
The approximated closed-form expressions of the EC for U 2 are given by
C ¯ 2 = 1 2 ln 2 a = 0 m U 2 1 μ U 2 a a ! ρ a G 1 , 2 2 , 1 μ U 2 ρ a 2 + a 1 1 a 1 , 1 a 1 , 0 × 1 a 2 + a 1 a 1 a 1 a G 1 , 2 2 , 1 μ U 2 ρ a 1 a 1 a 1 , 1 a 1 , 0 + π 2 2 D b = 0 m R N 1 q = 0 b n = 0 m R U 2 N 1 d = 1 D b q × m R U 2 N 1 n μ R U 2 m R U 2 N μ R b 1 φ d 2 b ! Γ m R U 2 N × 1 Λ φ d + a 2 + a 1 1 1 Λ φ d + a 1 1 Φ φ d q × sec 2 π φ d + 1 4 1 e μ U 2 Λ φ d ρ a = 0 m U 2 1 μ U 2 a Λ φ d a a ! ρ a × Λ φ d ρ m R U 2 N + b q n 1 e Λ φ d μ R U 2 + μ R ρ × μ R Φ φ d μ R U 2 n q + 1 2 K n q + 1 2 μ R μ R U 2 Φ φ d ,
where φ d = cos 2 d 1 2 D π , Λ r = tan π r + 1 4 and Φ r = Λ r ρ 2 Λ r + 1 .
Proof of Proposition 4, see Appendix C.
Finally, the EC of U 1 can be obtained as shown below
C ¯ 1 = E 1 2 log 2 1 + max γ U 1 , γ R U 1 , x 1 Y = 1 2 ln 2 0 1 1 + x 1 F Y x d x .
The CDF of Y is calculated as follows
F Y x = Pr max γ U 1 , γ R U 1 , x 1 < x = 1 e μ U 1 a 1 ρ x t = 0 m U 1 1 μ U 1 t x t t ! a 1 ρ t 1 2 k = 0 m R N 1 r = 0 k d = 0 m R U 1 N 1 × k r m R U 1 N 1 d μ R U 1 m R U 1 N μ R k e x a 1 ρ μ R U 1 + μ R k ! Γ m R U 1 N × x a 1 ρ + ρ 1 r 1 e μ U 1 a 1 ρ x t = 0 m U 1 1 μ U 1 t x t t ! a 1 ρ t × μ R μ R U 1 a 1 ρ x a 1 ρ + ρ 1 x d r + 1 2 x a 1 ρ m R U 1 N + k d 1 × K d r + 1 2 μ R μ R U 1 a 1 ρ x a 1 ρ + ρ 1 x .
By replacing (38) in (37), C 1 is given by
C ¯ 1 = 1 2 ln 2 E ¯ 1 + E ¯ 2 .
where
E ¯ 1 = t = 0 m U 1 1 μ U 1 t t ! a 1 ρ t 0 x t e μ U 1 a 1 ρ x 1 + x d x .
Similar to solving (A17) and (A18), this can be achieved E ¯ 1 as
E ¯ 1 = t = 0 m U 1 1 μ U 1 t t ! a 1 ρ t G 1 , 2 2 , 1 μ U 1 a 1 ρ x 1 t 1 , 1 t 1 , 0 .
Next, we have E ¯ 2 , which is calculated as
E ¯ 2 = 2 k = 0 m R N 1 r = 0 k d = 0 m R U 1 N 1 k r m R U 1 N 1 d × μ R U 1 m R U 1 N μ R k k ! Γ m R U 1 N 0 1 1 + x 1 e μ U 1 a 1 ρ x t = 0 m U 1 1 μ U 1 t x t t ! a 1 ρ t × x a 1 ρ + ρ 1 r x a 1 ρ m R U 1 N + k d 1 × μ R μ R U 1 x a 1 ρ + ρ 1 x d r + 1 2 e x a 1 ρ μ R U 1 + μ R × K d r + 1 2 μ R μ R U 1 x a 1 ρ + ρ 1 x .
Similar to solving (A17) and (A18), this can be achieved E ¯ 2 as
E ¯ 2 π 2 2 J k = 0 m R N 1 r = 0 k d = 0 m R U 1 N 1 j = 1 J k r m R U 1 N 1 d × 1 φ j 2 1 + Λ φ j 1 e μ U 1 Θ φ j t = 0 m U 1 1 μ U 1 t Θ φ j t t ! × μ R U 1 m R U 1 N μ R k k ! Γ m R U 1 N sec 2 π 4 Λ φ j + 1 Θ φ j + ρ 1 r × e Θ φ j μ R U 1 + μ R Θ φ j m R U 1 N + k d 1 × μ R Ξ r μ R U 1 d r + 1 2 K d r + 1 2 μ R μ R U 1 Ξ r ,
where φ j = cos 2 j 1 2 J π , Λ r = tan π r + 1 4 , Θ r = Λ r a 1 ρ and Ξ r = Θ r Θ r + ρ 1 .
As such, the EC of U 1 is given in (39).

6. Figure 2: Ergodic Capacity Analysis

Ergodic Rate of U 2 : On the condition that U 2 can detect x 2 , the achievable rate of U 2 can be written as C 2 I I = E 1 2 log 2 1 + γ ¯ R U 2 , x 2 n * . The EC of U 2 can be obtained in the following proposition.
Proposition 5.
The closed-form expression of approximated C 2 I I for U 2 is given by
C 2 I I a 2 π 4 a 1 Q ln 2 k = 1 K 1 ϕ k 2 1 + Λ ϕ k μ R m R N e μ R θ ˜ 2 ϕ k ρ Γ m R N q = 0 m R N 1 m R N 1 q × θ ˜ 2 ϕ k ρ m R N q 1 q ! μ R q + 1 2 a = 0 N N a 1 a e μ R U 2 a θ ˜ 2 ϕ k ρ × j 0 + + j m R U 2 1 = a a j 0 , , j m R U 2 1 b = 0 m R U 2 1 μ R U 2 b b ! j b c = 0 b j b b j b c × θ ˜ 2 ϕ k θ ˜ 2 ϕ k ρ 2 + 1 c θ ˜ 2 ϕ k ρ b j b c × μ R U 2 a θ ˜ 2 ϕ k θ ˜ 2 ϕ k ρ 2 + 1 μ R q c + 1 2 × K q c + 1 2 μ R μ R U 2 a θ ˜ 2 ϕ k θ ˜ 2 ϕ k ρ 2 + 1 ,
where ϕ k = cos 2 k 1 2 K π .
Proof. 
From (34) into C 2 I I , the EC of U 2 is written as
C 2 I I = 1 2 ln 2 0 a 2 a 1 1 1 + x 1 F X 1 x a 2 x a 1 d x = 1 2 ln 2 0 a 2 a 1 1 1 + x μ R m R N e μ R θ 2 x ρ Γ m R N q = 0 m R N 1 m R N 1 q × θ 2 x ρ m R N q 1 q ! μ R q + 1 2 a = 0 N N a 1 a × e μ R U 2 a θ 2 x ρ j 0 + + j m R U 2 1 = a a j 0 , , j m R U 2 1 × b = 0 m R U 2 1 μ R U 2 b b ! j b c = 0 b j b b j b c θ 2 x θ 2 x ρ 2 + 1 c × θ 2 x ρ b j b c μ R U 2 a θ 2 x θ 2 x ρ 2 + 1 μ R q c + 1 2 × K q c + 1 2 μ R μ R U 2 a θ 2 x θ 2 x ρ 2 + 1 d x ,
where X 1 = a 2 ρ 2 Y Z ¯ 2 n * a 1 ρ 2 Y Z ¯ 2 n * + ρ Y + ρ Z ¯ 2 n * + 1 and θ 2 x = x ρ 2 a 2 x a 1 .
Let t = 2 a 1 a 2 x 1 a 2 t + 1 2 a 1 = x a 2 2 a 1 d t = d x ; then, C 2 I I is calculated as
C 2 I I = a 2 4 a 1 ln 2 1 1 1 1 + Λ t μ R m R N e μ R θ ˜ 2 t ρ Γ m R N q = 0 m R N 1 m R N 1 q θ ˜ 2 t ρ m R N q 1 × q ! μ R q + 1 2 a = 0 N N a 1 a e μ R U 2 a θ ˜ 2 t ρ j 0 + + j m R U 2 1 = a a j 0 , , j m R U 2 1 × b = 0 m R U 2 1 μ R U 2 b b ! j b c = 0 b j b b j b c θ ˜ 2 t θ ˜ 2 t ρ 2 + 1 c × θ ˜ 2 t ρ b j b c μ R U 2 a θ ˜ 2 t θ ˜ 2 t ρ 2 + 1 μ R q c + 1 2 × K q c + 1 2 μ R μ R U 2 a θ ˜ 2 t θ ˜ 2 t ρ 2 + 1 d t ,
where Λ t = a 2 t + 1 2 a 1 and θ ˜ 2 t = Λ t ρ 2 a 2 Λ t a 1 .
Although obtaining a closed-form formula for C 2 I I is challenging, we can acquire an accurate approximation for it. We may obtain (44) by using Gaussian–Chebyshev quadrature Equation (25.4.38) [49].
The proof is finished. □
Ergodic Rate of U 1 : If U 1 is capable of detecting x 1 , the EC of U 1 may be calculated as
C 1 I I = E 1 2 log 2 1 + γ ¯ R U 1 , x 1 n * = 1 2 ln 2 0 1 F X 2 x 1 + x d x = 1 2 ln 2 0 1 1 + x μ R m R N e μ R θ 1 x ρ Γ m R N q = 0 m R N 1 m R N 1 q θ 1 x ρ m R N q 1 × q ! μ R q + 1 a = 0 N N a 1 a e μ R U 1 a θ 1 x ρ j 0 + + j m R U 1 1 = a a j 0 , , j m R U 1 1 × b = 0 m R U 1 1 μ R U 1 b b ! j b c = 0 b j b b j b c θ 1 x θ 1 x ρ 2 + 1 c × θ 1 x ρ b j b c 2 μ R U 1 a θ 1 x θ 1 x ρ 2 + 1 μ R q c + 1 2 × K q c + 1 2 μ R μ R U 1 a θ 1 x θ 1 x ρ 2 + 1 d x ,
where X 2 = a 1 ρ 2 Y Z ¯ 1 n * ρ Y + ρ Z ¯ 1 n * + 1 and θ 1 x = x a 1 ρ 2 .
After some steps, the EC of U 1 in Figure 2 can be obtained as (48), where step ( a ) follows by letting t = 4 π arctan x 1 and step ( b ) follows by using Gaussian–Chebyshev quadrature approximation [49], in which Ξ t = tan π t + 1 4 , θ ˜ 1 t = Ξ t a 1 ρ 2 , sec 2 x = 1 1 cos 2 x cos 2 x , K is a parameter that determines the trade-off between complexity and accuracy ϕ k = cos 2 k 1 2 K π .
C 1 I I = ( a ) π 8 ln 2 1 1 sec 2 π 4 t + 1 1 + Ξ t μ R m R N e μ R θ ˜ 1 t ρ Γ m R N q = 0 m R N 1 m R N 1 q θ ˜ 1 t ρ m R N q 1 × q ! μ R q + 1 2 a = 0 N N a 1 a e μ R U 1 a θ ˜ 1 t ρ j 0 + + j m R U 1 1 = a a j 0 , , j m R U 1 1 × b = 0 m R U 1 1 μ R U 1 b b ! j b c = 0 b j b b j b c θ ˜ 1 t θ ˜ 1 t ρ 2 + 1 c × θ ˜ 1 t ρ b j b c μ R U 1 a θ ˜ 1 t θ ˜ 1 t ρ 2 + 1 μ R q c + 1 2 × K q c + 1 2 μ R μ R U 1 a θ ˜ 1 t θ ˜ 1 t ρ 2 + 1 d t ( b ) π 2 8 K ln 2 k = 1 K 1 ϕ k 2 1 + Ξ t sec 2 π 4 t + 1 μ R m R N e μ R θ ˜ 1 ϕ k ρ Γ m R N × q = 0 m R N 1 m R N 1 q θ ˜ 1 ϕ k ρ m R N q 1 q ! μ R q + 1 2 a = 0 N N a 1 a × e μ R U 1 a θ ˜ 1 ϕ k ρ j 0 + + j m R U 1 1 = a a j 0 , , j m R U 1 1 b = 0 m R U 1 1 μ R U 1 b b ! j b × c = 0 b j b b j b c θ ˜ 1 ϕ k θ ˜ 1 ϕ k ρ 2 + 1 c θ ˜ 1 ϕ k ρ b j b c × μ R U 1 a θ ˜ 1 ϕ k θ ˜ 1 ϕ k ρ 2 + 1 μ R q c + 1 2 × K q c + 1 2 μ R μ R U 1 a θ ˜ 1 ϕ k θ ˜ 1 ϕ k ρ 2 + 1 .

7. Simulation Results

In this section, we set m = m U 1 = m U 2 = m R = m R U 1 = m R U 2 and numerically simulate some theoretical results to show the outage performance. In particular, the main parameters can be seen in Table 2. In addition, the Gaussian-Chebyshev parameter is selected as D = J = K = 100 to yield a close approximation.
In Figure 4, we examined the outage probability versus SNR and the number of antennas. The figure shows that the outage probability for User 2 is lower than that for user 1. Although the outage probability for both users tends to decrease linearly and quickly, the outage probability for User 2 still keeps a value of around 10 0 in the SNR range from 0 to 10 dB. In particular, when the number of antennas increases from 1 to 3, the outage probability for both users is reduced. This implies that the more antennas, the more reliable the system.
In Figure 5, we present the outage probability versus SNR and fading severity factor m. Similar to Figure 4, the outage probability for User 2 is also lower than that for User 1. The outage probability for both users decreases quickly as SNR increases. For impacts of m on the outage probability, it is observed from the figure that the larger the value of m, the higher the slope of the outage probability curves. This can be explained based on (15) and (17).
Figure 6 plots the outage probability versus power allocation coefficient a 2 . The figure shows that the outage probability for User 2 decreases in the case of increasing a 2 . However, this is the opposite for User 1 where the outage probability increases linearly when a 2 increases. In addition, the outage probability for two users tends to decrease since the number of antennas increases.
In Figure 7, we present the relationship between the outage probability and SNR for scenarios with and without direct links between BS and users for Figure 1. It is evident that the outage probability for User 2 consistently remains lower than that for User 1. Furthermore, when there is no direct link between BS and users, the outage probability for User 1 is higher compared to User 2. The absence of a direct link leads to a higher outage probability compared to scenarios with a direct link. Interestingly, as the value of m increases from 1 to 2, the outage probability for both users, in cases with or without direct links, consistently improves.
Figure 8 presents the outage probability as a function of SNR in dB in cases of NOMA and OMA schemes. It is observed from the figure that the outage probability for User 2 and NOMA is lower than that for OMA in both cases where the number of antennas is 1 and 2. However, this is the opposite for User 1 where the outage probability for OMA is lower than that for NOMA. In general, the outage probability curves decrease quickly as SNR increases.
In Figure 9, the ergodic capacity versus SNR in different cases of antennas (i.e., n = 1, 3, 5) was investigated. The figure shows that the ergodic capacity of User 2 increases gradually in the SNR range of 0 to 20 dB. However, this tends to remain constant during the SNR range of 20 to 30 dB. For User 1, the ergodic capacity increases rapidly as SNR varies from 10 to 30 dB. In addition, the number of antennas also causes a change in the ergodic capacity. Specifically, the higher the number of antennas, the larger the ergodic capacity. However, the impact of the number of antennas on the ergodic capacity for User 2 is insignificant, particularly in the SNR range of 20 to 30 dB.
Next, Figure 10 demonstrates that the performance of two users in Figure 1 is better than that of the users Figure 2 in terms of outage probability. The main reason is that Figure 1 still exhibits higher diversity, although Figure 1 requires a higher design cost. The demand for low-cost design for some applications of the Internet of Things would prefer the benefits of Figure 2.
Figure 11 presents the inclusion of simulation data for comparative analysis, serving to verify the accuracy of the obtained analytical results. Additionally, a comparison is made between the ergodic capabilities of the proposed system in Figure 1 and Figure 2. Specifically, User 2 demonstrates a higher ergodic capacity in Figure 1 compared to Figure 2 within the low and moderate SNR regions. However, User 1 achieves a superior ergodic capacity over Figure 2 across a wide range of SNR values. Remarkably, in the medium and high SNR ranges, User 2’s achievable capacity converges to a constant because interferences in the instantaneous SINRs at User 2 rise as the average SNR increases. Conversely, the interferences experienced by User 1 intensify as the average SNR rises, as demonstrated in Equations (36), (39), (44) and (48). Consequently, it is evident that the ergodic capacity of User 2 in Figure 1 outperforms that of User 2 in Figure 2.
Lastly, Figure 12 illustrates the variation of the ergodic capacity as the number of antennas increases, ranging up to 10. Notably, User 1 exhibits a higher ergodic capacity compared to User 2. The ergodic capacity demonstrates a proportional relationship with the number of antennas. However, for User 2, this capacity remains nearly constant when the number of antennas exceeds 4. This observation suggests that the impact of the number of antennas on User 1 is greater than that on User 2. This can be explained based on (36) and (39).

8. Conclusions and Future Work

This paper has presented two practical schemes of multiple-antennas UAV-aided IoT systems. Closed-form expressions for the outage probability were studied to confirm Figure 1 with a higher superiority of outage performance compared with Figure 2. We also provide performance analysis for the system by deriving a closed-form approximation of the ergodic capacity in Figure 1. The numerical results show that a weak user (User 2) achieves a lower probability than a strong user (User 1). The outage probability without direct links is lower than that with direct links. The IoT relying on the NOMA scheme is superior to that using the OMA scheme. The performance of the system increases when the number of antennas increases. These findings are a basic background for investigating the performance of the NOMA system with multiple antennas. In future work, reconfigurable intelligent surface-based UAVs could be studied to improve the performance of IoT users. In the future, we will combine UAV NOMA with changeable intelligent surfaces to increase system performance metrics even more.

Author Contributions

Conceptualization, S.Q.N., C.-B.L., P.T.T. and Y.-H.K.; methodology, S.Q.N., A.-T.L. and Y.-H.K.; formal analysis, S.Q.N., P.T.T. and A.-T.L.; writing—original draft preparation, C.-B.L. and A.-T.L.; writing—review and editing, S.Q.N., A.-T.L., P.T.T. and Y.-H.K.; funding acquisition, Y.-H.K. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2022R1F1A1074975) and in part by the Korea Institute of Energy Technology Evaluation and Planning (KETEP) and the Ministry of Trade, Industry and Energy (MOTIE) of the Republic of Korea (No. 20221A10100011).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Conflicts of Interest

We have also no conflict of interest to disclose.

Appendix A

Proof Proposition 1.
From (15), the outage probability at U 2 can be calculated by
P ¯ 2 I = Pr a 2 ρ X 2 a 1 ρ X 2 + 1 < ε t h A ¯ 1 × 1 Pr γ R U 2 , x 2 > ε t h A ¯ 2 .
Applying (13a), A ¯ 1 can be calculated as follows
A ¯ 1 = Pr a 2 ρ X 2 a 1 ρ X 2 + 1 < ε t h = Pr X 2 < θ = F X 2 θ = 1 e μ U 2 θ a = 0 m U 2 1 μ U 2 a θ a a ! ,
where θ = ε t h ρ a 2 a 1 ε t h
Next, A ¯ 2 can be computed as
A ¯ 2 = 1 Pr Y n Z 2 n > θ Y n + Z 2 n + ρ 1 = 1 Pr Y n > θ Z 2 n + ρ 1 Z 2 n θ , Z 2 n > θ = 1 θ f Z 2 n x 1 F Y n θ x + ρ 1 x θ d x = 1 b = 0 m R N 1 μ R U 2 m R U 2 N μ R b b ! Γ m R U 2 N θ x m R U 2 N 1 e μ R U 2 x × e μ R θ x + ρ 1 x θ θ x + ρ 1 x θ b d x .
Let t = x θ t + θ = x d t = d x ; then, A ¯ 2 is given by
A ¯ 2 = 1 b = 0 m R N 1 μ R U 2 m R U 2 N μ R b e θ μ R U 2 + μ R b ! Γ m R U 2 N 0 t + θ m R U 2 N 1 × e μ R U 2 t μ R θ θ + ρ 1 t θ + θ 2 + θ ρ 1 t b d t .
With the help of Equations (1.111), (3.471.9) [48] and after some manipulations, we have
A ¯ 2 = 1 2 b = 0 m R N 1 q = 0 b n = 0 m R U 2 N 1 b q m R U 2 N 1 n × μ R b θ m R U 2 N + b q n 1 e θ μ R U 2 + μ R b ! Γ m R U 2 N × μ R U 2 m R U 2 N θ 2 + θ ρ 1 q μ R θ θ + ρ 1 μ R U 2 n q + 1 2 × K n q + 1 2 μ R μ R U 2 θ θ + ρ 1 .
Finally, by substituting (A5) and (A2) into (A1), a closed-form expression for the outage probability at U 2 can be derived as
P ¯ 2 I = 1 e μ U 2 θ a = 0 m U 2 1 μ U 2 a θ a a ! 1 2 b = 0 m R N 1 q = 0 b n = 0 m R U 2 N 1 × 2 b q m R U 2 N 1 n θ 2 + θ ρ 1 q e θ μ R U 2 + μ R b ! Γ m R U 2 N × μ R b θ m R U 2 N + b q n 1 μ R θ 2 + θ ρ 1 μ R U 2 n q + 1 2 × μ R U 2 m R U 2 N K n q + 1 2 μ R μ R U 2 θ 2 + θ ρ 1 .
The proof is completed. □

Appendix B

Proof of Proposition 3.
The outage probability of U 2 with Figure 2 is calculated as
P ¯ 1 I I = 1 Pr Y Z ¯ 1 n * > θ max ρ Y + ρ Z ¯ 1 n * + 1 = 1 Pr Z ¯ 1 n * > θ max Y θ max ρ ρ Y + 1 = 1 Pr Z ¯ 1 n * > θ max Y θ max ρ ρ Y + 1 , Y > θ max ρ = 1 θ max ρ f Y x 1 F Z ¯ 1 n * θ max x θ max ρ ρ x + 1 d x = 1 μ R m R N Γ m R N θ max ρ x m R N 1 e μ R x × 1 a = 0 N N a 1 a e μ R U 1 a θ max x θ max ρ ρ x + 1 × j 0 + + j m R U 1 1 = a a j 0 , , j m R U 1 1 b = 0 m R U 1 1 × μ R U 1 b b ! j b θ max x θ max ρ ρ x + 1 b j b d x .
Let t = x θ max ρ t + θ max ρ = x d t = d x ; then, P ¯ 1 I I is given by
P ¯ 1 I I = 1 μ R m R N e μ R θ max ρ Γ m R N 0 t + θ max ρ m R N 1 e μ R t × 1 e μ R U 1 a θ max ρ a = 0 N N a 1 a e μ R U 1 a θ max θ max ρ 2 + 1 t × j 0 + + j m R U 1 1 = a a j 0 , , j m R U 1 1 b = 0 m R U 1 1 μ R U 1 b b ! j b × θ max θ max ρ 2 + 1 t + θ max ρ b j b .
Using Newton’s binomial, i.e., a + x k = v = 0 k k v x v a k v and Equation (3.351.3) [48], (A8) can be expressed as
P ¯ 1 I I = 1 μ R m R N e μ R θ max ρ Γ m R N q = 0 m R N 1 m R N 1 q × θ max ρ m R N q 1 q ! μ R q + 1 a = 0 N N a 1 a e μ R U 1 a θ max ρ × j 0 + + j m R U 1 1 = a a j 0 , , j m R U 1 1 b = 0 m R U 1 1 μ R U 1 b b ! j b × c = 0 b j b b j b c θ max θ max ρ 2 + 1 c θ max ρ b j b c × 0 e μ R t μ R U 1 a θ max θ max ρ 2 + 1 t t q c d t .
With the aid of Equation (3.471.9) [48], we have P 1 I I , which can be obtained by
P ¯ 1 I I = 1 μ R m R N e μ R θ max ρ Γ m R N q = 0 m R N 1 m R N 1 q × θ max ρ m R N q 1 q ! μ R q + 1 a = 0 N N a 1 a × e μ R U 1 a θ max ρ j 0 + + j m R U 1 1 = a a j 0 , , j m R U 1 1 × b = 0 m R U 1 1 μ R U 1 b b ! j b c = 0 b j b b j b c θ max θ max ρ 2 + 1 c × θ max ρ b j b c 2 μ R U 1 a θ max θ max ρ 2 + 1 μ R q c + 1 2 × K q c + 1 2 μ R μ R U 1 a θ max θ max ρ 2 + 1 .
The proof is completed. □

Appendix C

Proof of Proposition 4.
Ergodic Capacity of U 2
C ¯ 2 = E 1 2 log 2 1 + max γ U 2 , γ R U 2 , x 2 X = 1 2 ln 2 0 a 2 a 1 1 1 + x 1 F X x a 2 a 1 x d x
By the variable changing t = x a 2 a 1 x and after a few steps, (A11) can then [50]
C ¯ 2 = 1 2 ln 2 0 1 t + a 2 + a 1 1 1 t + a 1 1 1 F X t d t .
From A ¯ 1 and A ¯ 2 , we have F X t calculated as
F X t = Pr X 2 < t ρ Pr Y n > t Z 2 n + ρ 1 ρ Z 2 n θ , Z 2 n > t ρ = 1 e μ U 2 ρ t a = 0 m U 2 1 μ U 2 a t a a ! ρ a 2 1 e μ U 2 ρ t a = 0 m U 2 1 μ U 2 a t a a ! ρ a × b = 0 m R N 1 q = 0 b n = 0 m R U 2 N 1 b q m R U 2 N 1 n × μ R U 2 m R U 2 N μ R b b ! Γ m R U 2 N t 2 ρ 2 + t q e θ μ R U 2 + μ R × t ρ m R U 2 N + b q n 1 μ R μ R U 2 t 2 ρ 2 + t n q + 1 2 × K n q + 1 2 μ R μ R U 2 t 2 ρ 2 + t .
Substituting (A13) into (A11), C ¯ 2 is given by
C ¯ 2 = 1 2 ln 2 D ¯ 1 + D ¯ 2 ,
where
D ¯ 1 = a = 0 m U 2 1 μ U 2 a a ! ρ a 0 1 t + a 2 + a 1 1 1 t + a 1 1 t a e μ U 2 ρ t d t = a = 0 m U 2 1 μ U 2 a a ! ρ a 0 t a e μ U 2 ρ t t + a 2 + a 1 1 d t 0 t a e μ U 2 ρ t t + a 1 1 d t .
It is worth noting that e a x can be expressed in terms of the Meijer-G function as Equation (40) [51]
e a x = G 0 , 1 1 , 0 a x 0 ,
where G p , q m , n . Equation (9.301) [48] is the Meijer G-function, and (A15) is rewritten as
D ¯ 1 = a = 0 m U 2 1 μ U 2 a a ! ρ a 0 t a t + a 2 + a 1 1 G 0 , 1 1 , 0 μ U 2 ρ t 0 d t 0 t a t + a 1 1 G 0 , 1 1 , 0 μ U 2 ρ t 0 d t .
Applying Equation (7.811.5) [48], D ¯ 1 can be obtained as follows
D ¯ 1 = a = 0 m U 2 1 μ U 2 a a ! ρ a 1 a 2 + a 1 a G 1 , 2 2 , 1 μ U 2 ρ a 2 + a 1 1 a 1 , 1 a 1 , 0 1 a 1 a G 1 , 2 2 , 1 μ U 2 ρ a 1 a 1 a 1 , 1 a 1 , 0 .
Next, D ¯ 2 can be calculated by
D ¯ 2 = 2 b = 0 m R N 1 q = 0 b n = 0 m R U 2 N 1 b q m R U 2 N 1 n × μ R U 2 m R U 2 N μ R b b ! Γ m R U 2 N 0 1 t + a 2 + a 1 1 1 t + a 1 1 × μ R μ R U 2 t 2 ρ 2 + t ρ 2 n q + 1 2 1 e μ U 2 ρ t a = 0 m U 2 1 μ U 2 a t a a ! ρ a × t 2 ρ 2 + t ρ 2 q e t ρ μ R U 2 + μ R t ρ m R U 2 N + b q n 1 × K n q + 1 2 μ R μ R U 2 t 2 ρ 2 + t ρ 2 d t .
Let r = 4 π arctan t 1 tan π r + 1 4 = t π 4 sec 2 π 4 r + 1 d r = d t ; then, (A18) is given by
D ¯ 2 = π 2 b = 0 m R N 1 q = 0 b n = 0 m R U 2 N 1 b q m R U 2 N 1 n × μ R U 2 m R U 2 N μ R b b ! Γ m R U 2 N 1 1 1 Λ r + a 2 + a 1 1 1 Λ r + a 1 1 × sec 2 π 4 r + 1 1 e μ U 2 Λ r ρ a = 0 m U 2 1 μ U 2 a Λ r a a ! ρ a × Φ r q e Λ r ρ μ R U 2 + μ R Λ r ρ m R U 2 N + b q n 1 × μ R Φ r μ R U 2 n q + 1 2 K n q + 1 2 μ R μ R U 2 Φ r .
Unfortunately, finding a closed-form expression for (A19) is a tough task, but an accurate approximation can be obtained for it. By using the Gaussian–Chebyshev quadrature shown in Equation (25.4.38) [49], it can be achieved by
D ¯ 2 π 2 2 D b = 0 m R N 1 q = 0 b n = 0 m R U 2 N 1 d = 1 D b q m R U 2 N 1 n × μ R U 2 m R U 2 N μ R b b ! Γ m R U 2 N 1 φ d 2 sec 2 π 4 φ d + 1 × 1 Λ φ d + a 2 + a 1 1 1 Λ φ d + a 1 1 × 1 e μ U 2 Λ φ d ρ a = 0 m U 2 1 μ U 2 a Λ φ d a a ! ρ a × Φ φ d q e Λ φ d ρ μ R U 2 + μ R Λ φ d ρ m R U 2 N + b q n 1 × μ R Φ φ d μ R U 2 n q + 1 2 K n q + 1 2 μ R μ R U 2 Φ φ d ,
where φ d = cos 2 d 1 2 D π , Λ r = tan π r + 1 4 and Φ r = Λ r ρ 2 Λ r + 1 .
The proof is completed. □

References

  1. Katwe, M.; Singh, K.; Sharma, P.K.; Li, C.-P.; Ding, Z. Dynamic User Clustering and Optimal Power Allocation in UAV-Assisted Full-Duplex Hybrid NOMA System. IEEE Trans. Wirel. Commun. 2022, 21, 2573–2590. [Google Scholar] [CrossRef]
  2. Zhai, D.; Li, H.; Tang, X.; Zhang, R.; Cao, H. Joint position optimization, user association, and resource allocation for load balancing in UAV-assisted wireless networks. Digit. Commun. Netw. 2022, in press. [CrossRef]
  3. Cao, H.; Hu, Y.; Yang, L. Towards Intelligent Virtual Resource Allocation in UAVs-Assisted 5G Networks; Computer Networks; Elsevier: Amsterdam, The Netherlands, 2021; Volume 185, p. 107660. [Google Scholar]
  4. Cao, H.; Du, J.; Zhao, H.; Luo, D.X.; Kumar, N.; Yang, L.; Yu, F.R. Resource-ability assisted service function chain embedding and scheduling for 6G networks with virtualization. IEEE Trans. Veh. Technol. 2021, 70, 3846–3859. [Google Scholar] [CrossRef]
  5. Zhai, D.; Wang, C.; Zhang, R.; Cao, H.; Yu, F.R. Energy-Saving Deployment Optimization and Resource Management for UAV-Assisted Wireless Sensor Networks With NOMA. IEEE Trans. Veh. Technol. 2022, 71, 6609–6623. [Google Scholar] [CrossRef]
  6. Solanki, S.; Park, J.; Lee, I. On the Performance of IRS-Aided UAV Networks with NOMA. IEEE Trans. Veh. Technol. 2022, 71, 9038–9043. [Google Scholar] [CrossRef]
  7. Do, D.-T.; Le, A.-T.; Liu, Y.; Jamalipour, A. User Grouping and Energy Harvesting in UAV-NOMA System With AF/DF Relaying. IEEE Trans. Veh. Technol. 2021, 70, 11855–11868. [Google Scholar] [CrossRef]
  8. Zeng, Y.; Xu, J.; Zhang, R. Energy minimization for wireless communication with rotary-wing UAV. IEEE Trans. Wireless Commun. 2019, 18, 2329–2345. [Google Scholar] [CrossRef] [Green Version]
  9. Wang, L.; Hu, B.; Chen, S.; Cui, J. UAV-Enabled Reliable Mobile Relaying Based on Downlink NOMA. IEEE Access 2020, 8, 25237–25248. [Google Scholar] [CrossRef]
  10. Baidas, M.W.; AbdelGhaffar, A.M.; Alsusa, E. Network sum-rate maximization via joint power allocation and antenna selection for clustered downlink/uplink NOMA networks. Phys. Commun. 2022, 51, 101596. [Google Scholar] [CrossRef]
  11. Flores, A.; de Lamare, R.C. Study of Robust Adaptive Power allocation for the Downlink of Multiple-Antenna Systems. arXiv 2022, arXiv:2202.06148. [Google Scholar]
  12. Zeng, M.; Hao, W.; Dobre, O.A.; Ding, Z. Cooperative NOMA: State of the Art, Key Techniques, and Open Challenges. IEEE Netw. 2020, 34, 205–211. [Google Scholar] [CrossRef]
  13. Yuan, Y.; Xu, P.; Yang, Z.; Ding, Z.; Chen, Q. Joint robust beamforming and power-splitting ratio design in SWIPT-based cooperative NOMA systems with CSI uncertainty. IEEE Trans. Veh. Technol. 2019, 68, 2386–2400. [Google Scholar] [CrossRef] [Green Version]
  14. Li, X.; Li, J.; Liu, Y.; Ding, Z.; Nallanathan, A. Residual Transceiver Hardware Impairments on Cooperative NOMA Networks. IEEE Trans. Wirel. Commun. 2020, 19, 680–695. [Google Scholar] [CrossRef]
  15. Do, D.-T.; Le, A. NOMA based cognitive relaying: Transceiver hardware impairments, relay selection policies and outage performance comparison. Comput. Commun. 2019, 146, 144–154. [Google Scholar] [CrossRef]
  16. Do, D.-T.; Le, A.-T.; Lee, B.M. NOMA in Cooperative Underlay Cognitive Radio Networks Under Imperfect SIC. IEEE Access 2020, 8, 86180–86195. [Google Scholar] [CrossRef]
  17. Le, A.T.; Do, D.T.; Chang, W.T.; Vu, C.T. Cognitive IoT relaying NOMA networks with user clustering and imperfect SIC. Peer-to-Peer Netw. Appl. 2021, 14, 3170–3180. [Google Scholar] [CrossRef]
  18. Yang, Z.; Ding, Z.; Wu, Y.; Fan, P. Novel relay selection strategies for cooperative NOMA. IEEE Trans. Veh. Technol. 2017, 66, 10114–10123. [Google Scholar] [CrossRef] [Green Version]
  19. Xu, P.; Yang, Z.; Ding, Z.; Zhang, Z. Optimal relay selection schemes for cooperative NOMA. IEEE Trans. Veh. Technol. 2018, 67, 7851–7855. [Google Scholar] [CrossRef]
  20. Ashraf, M.; Shahid, A.; Jang, J.W.; Lee, K.G. Energy harvesting non-orthogonal multiple access system with multi-antenna relay and base station. IEEE Access 2017, 5, 17660–17670. [Google Scholar] [CrossRef] [Green Version]
  21. Lv, L.; Ye, Q.; Ding, Z.; Li, Z.; Al-Dhahir, N.; Chen, J. On the design of NOMA assisted multi-antenna two-way relay systems. In Proceedings of the IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar]
  22. Wang, X.; Li, E.; Yang, G.; Xu, L. Performance analysis of 5G Downlink Cooperative NOMA network with multi-antenna relay. Phys. Commun. 2022, 52, 101586. [Google Scholar]
  23. Cao, Y.; Zhao, N.; Pan, G.; Chen, Y.; Fan, L.; Jin, M.; Alouini, M.S. Secrecy analysis for cooperative NOMA networks with multi-antenna full-duplex relay. IEEE Trans. Commun. 2019, 67, 5574–5587. [Google Scholar] [CrossRef] [Green Version]
  24. Zaghdoud, N.; Mnaouer, A.B.; Alouane, W.H.; Boujemaa, H.; Touati, F. Secrecy Performance Analysis of Multi-Antenna NOMA System with AF/DF relaying under External and Internal Eavesdropping Scenarios. In Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June 2020; pp. 1726–1732. [Google Scholar]
  25. Tang, Z.; Sun, L.; Cao, L.; Qi, S.; Feng, Y. Reconsidering Design of Multi-Antenna NOMA Systems With Limited Feedback. IEEE Trans. Wirel. Commun. 2020, 19, 1519–1534. [Google Scholar] [CrossRef]
  26. Lv, L.; Ye, Q.; Ding, Z.; Li, Z.; Al-Dhahir, N.; Chen, J. Multi-Antenna Two-Way Relay Based Cooperative NOMA. IEEE Trans. Wirel. Commun. 2020, 19, 6486–6503. [Google Scholar] [CrossRef]
  27. Le, T.A.; Kong, H.Y. Energy harvesting relay-antenna selection in cooperative MIMO/NOMA network over Rayleigh fading. Wirel. Netw. 2020, 26, 2075–2087. [Google Scholar] [CrossRef]
  28. Hakimi, A.; Mohammadi, M.; Mobini, Z. Outage Probability of Wireless-powered Multi-antenna Cooperative Spectrum Sharing Networks with Full-duplex and NOMA Transmissions. In Proceedings of the International Symposium on Telecommunications (IST), Tehran, Iran, 17–19 December 2018; pp. 127–132. [Google Scholar]
  29. Mobini, Z.; Mohammadi, M.; Suraweera, H.A.; Ding, Z. Full-duplex multi-antenna relay assisted cooperative non-orthogonal multiple access. In Proceedings of the IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–7. [Google Scholar]
  30. Lin, Z.; Lin, M.; Wang, J.-B.; de Cola, T.; Wang, J. Joint Beamforming and Power Allocation for Satellite-Terrestrial Integrated Networks With Non-Orthogonal Multiple Access. IEEE J. Sel. Top. Signal Process. 2019, 13, 657–670. [Google Scholar] [CrossRef] [Green Version]
  31. Lin, Z.; Lin, M.; Champagne, B.; Zhu, W.-P.; Al-Dhahir, N. Secrecy-Energy Efficient Hybrid Beamforming for Satellite-Terrestrial Integrated Networks. IEEE Trans. Commun. 2021, 69, 6345–6360. [Google Scholar] [CrossRef]
  32. Lin, Z.; Niu, H.; An, K.; Wang, Y.; Zheng, G.; Chatzinotas, S.; Hu, Y. Refracting RIS-Aided Hybrid Satellite-Terrestrial Relay Networks: Joint Beamforming Design and Optimization. IEEE Trans. Aerosp. Electron. Syst. 2022, 58, 3717–3724. [Google Scholar] [CrossRef]
  33. Lin, Z.; Lin, M.; de Cola, T.; Wang, J.-B.; Zhu, W.-P.; Cheng, J. Supporting IoT With Rate-Splitting Multiple Access in Satellite and Aerial-Integrated Networks. IEEE Internet Things J. 2021, 8, 11123–11134. [Google Scholar] [CrossRef]
  34. Katwe, M.; Singh, K.; Sharma, P.K.; Li, C.-P. Energy Efficiency Maximization for UAV-Assisted Full-Duplex NOMA System: User Clustering and Resource Allocation. IEEE Trans. Green Commun. Netw. 2022, 6, 992–1008. [Google Scholar] [CrossRef]
  35. Zhou, S.; Cheng, Y.; Lei, X.; Peng, Q.; Wang, J.; Li, S. Resource allocation in UAV-assisted networks: A clustering-aided reinforcement learning approach. IEEE Trans. Veh. Technol. 2022, 71, 12088–12103. [Google Scholar] [CrossRef]
  36. Abu-Baker, A.; Shakhatreh, H.; Sawalmeh, A.; Alenezi, A.H. Efficient Data Collection in UAV-Assisted Cluster-Based Wireless Sensor Networks for 3D Environment: Optimization Study. J. Sens. 2023, 2023, 9513868. [Google Scholar] [CrossRef]
  37. Yao, Y.; Wu, Y.; Zhu, Z.; Qin, X.; Yue, X. Modeling and performance analysis in UAV-assisted cellular networks with clustered edge users. Electronics 2022, 11, 828. [Google Scholar] [CrossRef]
  38. Ghobaei, M.; Shahidinejad, A.A. A cost-efficient IoT service placement approach using whale optimization algorithm in fog computing environment. Expert Syst. Appl. 2022, 200, 117012. [Google Scholar] [CrossRef]
  39. Tahir, B.; Schwarz, S.; Rupp, M. Analysis of uplink IRS-assisted NOMA under Nakagami-m fading via moments matching. IEEE Wirel. Commun. Lett. 2020, 10, 624–628. [Google Scholar] [CrossRef]
  40. Saito, Y.; Kishiyama, Y.; Benjebbour, A.; Nakamura, T.; Li, A.; Higuchi, K. Non-orthogonal multiple access (NOMA) for cellularfuture radio access. In Proceedings of the 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), Dresden, Germany, 2–5 June 2013; pp. 1–5. [Google Scholar]
  41. Do, T.N.; da Costa, D.B.; Duong, T.Q.; An, B. Improving the performance of cell-edge users in noma systems using cooperative relaying. IEEE Trans. Commun. 2018, 66, 1883–1901. [Google Scholar] [CrossRef]
  42. Zhu, G.; Zhong, C.; Suraweera, H.A.; Zhang, Z.; Yuen, C. Outage Probability of Dual-Hop Multiple Antenna AF Systems with Linear Processing in the Presence of Co-Channel Interference. IEEE Trans.Wirel. Commun. 2014, 13, 2308–2321. [Google Scholar] [CrossRef] [Green Version]
  43. Li, M.; Lin, M.; Zhu, W.-P.; Huang, Y.; Wong, K.-K.; Yu, Q. Performance analysis of dual-hop MIMO AF relaying network with multiple interferences. IEEE Trans. Veh. Technol. 2017, 66, 1891–1897. [Google Scholar] [CrossRef] [Green Version]
  44. Nguyen, N.-T.; Nguyen, H.-N.; Nguyen, N.-L.; Le, A.-T.; Do, D.-T.; Voznak, M. Enhancing Spectrum Efficiency for Multiple Users in Hybrid Satellite-Terrestrial Networks. IEEE Access 2021, 9, 50291–50300. [Google Scholar] [CrossRef]
  45. Lee, S.; Costa, D.B.D.; Vien, Q.-T.; Duong, T.Q.; Sousa, R.T.D. Non-orthogonal multiple access schemes with partial relay selection. IET Commun. 2017, 11, 846–854. [Google Scholar] [CrossRef] [Green Version]
  46. Wang, Q.; Ge, J.; Li, Q.; Bu, Q. Performance analysis of NOMA for multiple-antenna relaying networks with energy harvesting over Nakagami-m fading channels. In Proceedings of the 2017 IEEE/CIC International Conference on Communications in China (ICCC) 2017, Qingdao, China, 22–24 October 2017; pp. 1–5. [Google Scholar]
  47. Hung, C.C.; Chiang, C.T.; Lin, S.N.; Wu, R.C. Outage capacity analysis of TAS/MRC systems over arbitrary Nakagami-m fading channels. IEICE Trans. Commun. 2010, 93, 215–218. [Google Scholar] [CrossRef]
  48. Gradshteyn, I.S.; Ryzhik, I.M. Tables of Integrals, Series and Products, 6th ed.; Academic Press: New York, NY, USA, 2000. [Google Scholar]
  49. Abramowitz, M.; Stegun, I.A. Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables; Dover: New York, NY, USA, 1972. [Google Scholar]
  50. Nguyen, T.-L.; Le, C.-B.; Do, D.-T. Performance analysis of multi-user NOMA over α-κ-μ shadowed fading. Electron. Lett. 2020, 56, 771–773. [Google Scholar] [CrossRef]
  51. Huang, Q.; Lin, M.; An, K.; Ouyang, J.; Zhu, W. Secrecy performance of hybrid satellite-terrestrial relay networks in the presence of multiple eavesdroppers. IET Commun. 2018, 12, 26–34. [Google Scholar] [CrossRef]
Figure 1. Multi-antenna UAV-aided IoT network.
Figure 1. Multi-antenna UAV-aided IoT network.
Sensors 23 05537 g001
Figure 2. Separated antenna selection for UAV-aided IoT network.
Figure 2. Separated antenna selection for UAV-aided IoT network.
Sensors 23 05537 g002
Figure 3. The block diagram of the antenna selection for Figure 2.
Figure 3. The block diagram of the antenna selection for Figure 2.
Sensors 23 05537 g003
Figure 4. Outage probability versus transmitting SNR of two users with direct link.
Figure 4. Outage probability versus transmitting SNR of two users with direct link.
Sensors 23 05537 g004
Figure 5. The outage probability versus SNR and different values of m, with N = 2 with direct link.
Figure 5. The outage probability versus SNR and different values of m, with N = 2 with direct link.
Sensors 23 05537 g005
Figure 6. The outage probability versus a 2 with ρ = 10 (dB), m = 2 and different values of N with direct link.
Figure 6. The outage probability versus a 2 with ρ = 10 (dB), m = 2 and different values of N with direct link.
Sensors 23 05537 g006
Figure 7. The outage probability with/without direct link versus ε t h = 3 (dB) and N = 2 .
Figure 7. The outage probability with/without direct link versus ε t h = 3 (dB) and N = 2 .
Sensors 23 05537 g007
Figure 8. Comparison of outage probability between OMA and NOMA versus SNR with m = 2 with direct link.
Figure 8. Comparison of outage probability between OMA and NOMA versus SNR with m = 2 with direct link.
Sensors 23 05537 g008
Figure 9. The ergodic capacity versus SNR and different values of N, with m = 2 with direct link.
Figure 9. The ergodic capacity versus SNR and different values of N, with m = 2 with direct link.
Sensors 23 05537 g009
Figure 10. Outage comparison between Figure 1 and Figure 2, with m = 2 .
Figure 10. Outage comparison between Figure 1 and Figure 2, with m = 2 .
Sensors 23 05537 g010
Figure 11. Ergodic capacity between Figure 1 and Figure 2 with m = 2 and N = 2 .
Figure 11. Ergodic capacity between Figure 1 and Figure 2 with m = 2 and N = 2 .
Sensors 23 05537 g011
Figure 12. The ergodic capacity versus N with m = 2 with direct link.
Figure 12. The ergodic capacity versus N with m = 2 with direct link.
Sensors 23 05537 g012
Table 1. Comparison of the proposed scheme with similar ideas.
Table 1. Comparison of the proposed scheme with similar ideas.
Our Scheme[1][34][35][36][37][38]
NOMAXXX
Multiple-Antennas UAVX
Multiple UAV X
Maximum Ratio TransmissionX
Transmit Antenna SelectionX
Amplify and ForwardX
Interference XX X
Outage ProbabilityX
Ergodic CapacityX
Nakagami-m ChannelX
Optimization XXXX X
Table 2. Definition of system parameters.
Table 2. Definition of system parameters.
ParametersNotationValues
The power allocation coefficient a 1 , a 2 0.1 , 0.9
The fading severity parameterm2
Target rates SINR ε t h 2 (dB)
Antennas at RN 1 , 2 , 3
The average power λ U 1 , λ U 2 1 , 1
λ R 1
λ R U 1 0.5
λ R U 2 0.9
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Nguyen, S.Q.; Le, A.-T.; Le, C.-B.; Tin, P.T.; Kim, Y.-H. Exploiting User Clustering and Fixed Power Allocation for Multi-Antenna UAV-Assisted IoT Systems. Sensors 2023, 23, 5537. https://doi.org/10.3390/s23125537

AMA Style

Nguyen SQ, Le A-T, Le C-B, Tin PT, Kim Y-H. Exploiting User Clustering and Fixed Power Allocation for Multi-Antenna UAV-Assisted IoT Systems. Sensors. 2023; 23(12):5537. https://doi.org/10.3390/s23125537

Chicago/Turabian Style

Nguyen, Sang Quang, Anh-Tu Le, Chi-Bao Le, Phu Tran Tin, and Yong-Hwa Kim. 2023. "Exploiting User Clustering and Fixed Power Allocation for Multi-Antenna UAV-Assisted IoT Systems" Sensors 23, no. 12: 5537. https://doi.org/10.3390/s23125537

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop