1. Introduction
To adapt fast development in wireless techniques, many protocols and topologies have been introduced. One of these schemes, relaying networks has recently attracted the research community due to extended coverage and improved reliability [1,2,3,4]. Full-duplex is considered a scheme that exhibits higher bandwidth efficiency and such schemes are proposed in wireless powered relaying networks as in [2,3]. However, multiple users need to be served to access the core network, and it requires the base station in a cellular network that can transmit a mixture of signals to them. To address this shortcoming, PDMA or non-orthogonal multiple access (NOMA) has been recently introduced to improve the spectral efficiency and to provide fairness in resource allocation. These advantages can be performed by multiplexing multiple users on the same time/frequency resource [5,6,7,8,9,10,11,12]. In particular, NOMA employs the power domain to serve multiple access and harnesses interference via superposition coding at the transmitter, while successive interference cancellation (SIC) is required at the receiver. In [6], the authors investigated maximal performance of single-input single output (SISO) single-carrier (SC) NOMA systems in terms of system throughput and they explored the optimal power allocation design. The higher spectral efficiency can be achieved in SISO NOMA compared to conventional SISO OMA [6]. The suboptimal precoding design is presented for minimization of the transmit power in multiple-input single-output (MISO) SC-NOMA systems [7]. In addition, zero-forcing downlink (DL) beamforming was analyzed in MISO SC-NOMA systems [8].
Furthermore, it is very expensive to deploy a MISO system since both space-time codes and transmit beamforming require multiple RF chains [13]. Fortunately, the antenna selection scheme is proposed to overcome such disadvantage, providing a good trade-off between cost, complexity, and performance [13]. Antenna selection can be implemented at both ends, and transmit antenna selection with maximal-ratio combining (TAS/MRC) is presented in [14]. This scheme can be mainly described as follows: by using CSI feedback, the best transmit antenna out of all transmit candidates to maximize the post processing signal to noise ratio (SNR) at the MRC output of receive antennas, is selected to transmit data for the corresponding user. These analytical discussions motivate us to explore improved performance of MISO PDMA.
With distant transmission, relaying schemes are required but in close distance transmission, and so new protocols need to be exhibited. Recently, in project 3GPP for long term evolution (LTE), device to device (D2D) communication has been introduced. As one of the effective technologies of the forthcoming 5th generation (5G) cellular standard, D2D is explored as in [15]. By using new paradigm, i.e., without or limited controlling and signaling information from the base station (BS), two users can communicate in instant and direct ways with each other (when in proximity) in context of D2D scenario [16,17,18,19,20]. Furthermore, potential application in disaster-affected areas needs fast connections and D2D can be adopted in such case. In particular, the local connectivity is provided to devices even in a case of damage to the network infrastructure. D2D can be employed in several other emerging applications. For example, vehicular-to-vehicular (V to V) communication, vehicular-to-infrastructure (V to I) communication are introduced with applications of D2D communication to exhibit proximity based add-on services and multi-party gaming or public safety applications are studied as well [21,22]. It can be exhibited commercial D2D communication to improve the throughput, spectrum utilization, and energy efficiency of the cellular network. Other challenges are raised such as interference management security. To meet the capacity requirements of the 5G cellular system, a project was deployed and it is known as METIS (mobile and wireless communications enablers for the twenty-twenty information society). The METIS has recently been funded by the European Union [23].
Regarding exploiting advantages of D2D into NOMA, the authors in [24] investigated a model of the integration of a downlink NOMA system with D2D communications. D2D reported in [25] with resource allocation scheme is promising approach. They further derived expressions of the outage probability that both users obtain higher rates in NOMA under a fixed power control strategy. In addition, the uplink multi-carrier is considered in NOMA with support of D2D underlaid cellular networks [26]. More specifically, an iterative algorithm applying Karush-Kuhn-Tucker conditions is proposed to solve the power allocation problem in D2D NOMA [26]. The authors in [27] studied the device-to-device (D2D) assisted and NOMA-based mobile edge computing (MEC) system by deploying D2D communication for enabling user collaboration and reducing the edge server’s load.
In this paper, we consider a D2D transmission existing in a downlink PDMA system. The selected antenna at one BS communicating has two D2D far receivers with the aid of D2D implementation. Different from existing works on D2D PDMA [26,27], where the end-user operating half-duplex, we assume that the D2D users operate in the FD mode and investigate outage performance taking into account both the downlink and D2D links. The key contributions of this study are summarized as follows:
1. In the presence of a downlink under support of multiple antenna based BS, two D2D users exhibit different outage performance. We individually investigated the performance of each end-user in such a MISO NOMA system. Compared to most existing cooperative PDMA schemes, FD scheme is enabled at the end-user. To look how good performance two far users have, two far D2D users with different QoS requirements can be paired with each other and get benefit from D2D transmission.
2. Different from [25], transmit selection and full-duplex are joint investigated in this study. Most important is that we provide simulation results of integration of a D2D connection to a downlink two-user PDMA system.
3. We provide simulation results showing that, under the fixed power allocation strategies, D2D users achieve outage behavior in the NOMA scheme. The results also indicate the probability that both D2D users obtain improved outage performance in MISO PDMA depends on the power level of the BS and the required target rates.
4. For system performance evaluation, the closed-form expressions for the outage probabilities are derived for both two D2D users. To highlight the impact of the system parameters on the outage performance, outage probabilities achieved at both two D2D users are simulated to verify derived expressions.
Notation: The cumulative distribution function of a real-valued random variable X is denoted byFX(.),fX(.)stands for probability density functions, whilePr(.)symbolizes outage probability.
2. System Model
We consider a downlink MISO aided PDMA network as shown in Figure 1, in which the base station (BS) is equipped with multiple antennas to serve two PDMA users. There are conventional cellular users (CUE) in this model, such CUE devices are able to receive signal under coverage of this BS, but this paper focuses on more complex operations of D2D users. It is assumed that interference from CUE to D2D users is smaller than self-interference at each D2D user. In this case, two PDMA users (D1,D2) operate in full-duplex (FD) mode and they can communicate directly without helping of the BS as underlay topology. Two PDMA users are able to communicate directly on channelhi,i=1,2. It is noted thatgi,kdenotes the channel gain between the BS and userDi,i=1,2, the BS hask,(k=1,2,…K)antennas. Further, in this scenario PDMA users are double-antenna devices and operate in a FD mode, except for the BS equipped multiple antenna. The direct links between the source node and the users are assumed available, which is common in the scenarios where two PDMA users acquire device to device transmission in reliable coverage of such BS. We assume that all users are clustered very close such that a homogeneous network topology is considered in our paper. The channels associated with each link exhibit the Rayleigh fading and additive white Gaussian noise (AWGN).
In first phase, the BS sends signalx=a1 PSx1+a2 PSx2toD1andD2according to direct transmissions. Here,PSis the transmitted power of the BS,x1x2is the signal ofD1D2, anda1,a2is the power allocation coefficient witha1+a2=1,a1>a2.
2.1. Calculation of Signal to Noise Ratio (SNR)
The received signal atDiis given by
yDiFD−PDMA=gi,ka1 PSx1+a2 PSx2+fiϖPDixFDi+wi,
whereϖ=1denotes user 1 working in FD,PDiis transmit power ofDi,i=1,2andwiis the additive white Gaussian noise with zero mean and varianceN0. We callxFDia signal related to self-interference at user i, andfiis the self-interference channel and followsfi∼CN0,λfi .
Then, the received signal-to-interference-plus-noise ratio (SINR) at user 1D1becomes
ySD1,kFD−PDMA=a1ρg1,k2a2ρg1,k2+ϖρf12+1,
whereρ=PSPS N0N0is the transmit signal-to-noise ratio (SNR) which was measured at the BS.
In this scenario,D2is so-called as SIC user, i.e., SIC is required to eliminate interference from signal ofD1. Firstly, the received SINR at user 2 to detect user1’s messagex1is given by
γSD1←2,kFD−PDMA=a1ρg2,k2a2ρg2,k2+ϖρf22+1.
Then SIC is activated to eliminate interference fromD1, the received SINRs at the user 2D2is calculated to decode its own signal as
γSD2,kFD−PDMA=a2ρg2,k2ϖρf22+1.
2.2. D2D Transmission
In this phase, the cooperation signal is transmitted from the user with a stronger channel gain to the user with a weaker gain. The cooperation signal can help user 1 to decode its data, or user 2 to perform SIC better. The cooperation signal received by user 1D1is given by
zDiPDMA=hiPSs+fiϖPDixFDi+ni,
whereh1is a Rayleigh fading channel coefficient from user 1 to user 2 and vice versa. As mentioned in the channel information exchange phase, wheng1,k2>g2,k2, onlyzD2PDMAexists, and wheng1,k2<g2,k2, onlyzD1PDMAis transmitted fromD2.
Generally, the received SINR at user i is given by
χDiPDMA=ρhi2ϖρfi2+1.
The SINR for decodingx1is given by
χ=minmaxγSD1,kPDMA,χD1PDMA,γSD1←2,kPDMA,ifg1,k2<g2,k2minγSD1,kPDMA,maxγSD1←2,kPDMA,χD2PDMA,otherwise.
The antenna index can be selected to strengthen the BS to serve user i link as follows:
k*=argmax︸k=1,…,Kgi,k2.
In this case, CDF and PDF related selected channel are given respectively by
Fgi,k*2 x=1−∑k=1KKk−1k−1exp−kxλg,
and
fgi,k*2 x=∑k=1KKk−1k−1kλgexp−kxλg.
Here,λuis the channel gain of u.
3. Outage Probability Performance Analysis
When the targeted data rates,R1andR2are determined by the users’ QoS requirements for userD1,D2. In fact, the outage probability is an important performance criterion which needs to be investigated. If the outage event occurs at the non-SIC user, the SIC user does not use the D2D signal, and the outage of the SIC user does not allow D2D transmission from the SIC user to the non-SIC user.
3.1. Outage Probability of D2D User 1
Considering outage probability ofD1: According to PDMA protocol, the complementary events of outage atD1can be explained as:D1can detectx2as well as its own messagex1. From the above description, the outage probability ofD1is expressed as
OPD1−bi=PrγSD1,k*PDMA<ε1,γSD1←2,k*PDMA<ε1︸B1+PrmaxγSD1,k*PDMA,χD1PDMA<ε1,γSD1←2,k*PDMA>ε1︸B2,
Proposition 1.
The closed-form expression of outage probability at D1 is given by
OPD1−bi=1−∑k=1KKk−1k−1ϑ11−∑k=1KKk−1k−1 ϑ2+1−∑k=1KKk−1k−1 ϑ1×1−ρλh1 ρλh1 +ε1ϖρλf1 exp−ε1ρλh1 ∑k=1KKk−1k−1 ϑ2
whereε1=22R1,R1is target rate for signalx1.
Proof.
See Appendix A. □
3.2. Outage Probability of D2D User 2
The outage events ofD2can be explained as below. The first is thatD1cannot detectx2. The second is thatD2cannot detect its own messagex2on the conditions thatD1can detectx2successfully. Based on these, the outage probability ofD2is expressed as
OPD2−bi=PrγSD2,k*PDMA<ε2∪γSD1←2,k*PDMA<ε1,γSD1,k*PDMA<ε2︸Ψ1+PrγSD2,k*PDMA<ε2∪maxγSD1←2,k*PDMA,χD2PDMA<ε1,γSD1,k*PDMA>ε1︸Ψ2,
whereε2=22R2,R2is denoted as target rate for signalx2 , and with the help of (5) and (7), termsΨ1andΨ2can be calculated, the first being
Ψ1=PrγSD2,k*PDMA<ε2∪γSD1←2,k*PDMA<ε1,γSD1,k*PDMA<ε2=1−PrγSD2,k*PDMA≥ε2,γSD1←2,k*PDMA≥ε1︸D111−PrγSD1,k*PDMA≥ε2︸D12.
Therefore,D11can be expressed as
D11=Prg2,k2≥ε2ϖρf22+ε2a2ρ,g2,k2≥ε1ϖρf22+ε1a1ρ−ε1 a2ρ=Prg2,k2≥ε2ϖρf22+1a2ρ,g2,k2≥ε1ϖρf22+1a1ρ−ε1 a2ρ=Prg2,k2≥ϖρf22+1maxε2a2ρ,ε1a1ρ−ε1 a2ρ,
whereθ=maxε2a2ρ,ε1a1ρ−ε1 a2ρ.
It worth noting that, we can achieve important computations as below:
D11=Prg2,k2≥ϖρf22+1θ=1λf2 ∫0∞∑k=1KKk−1k−1exp−ϖρy+1θkλ2−yλf2 dy=∑k=1KKk−1k−1λ2θkϖρλf2 +λ2exp−θkλ2.
Similarly,D12can be expressed as
D12=1−PrγSD1,k*PDMA≥ε2=1−Prg1,k2≥ε2ϖρf12+ε2a1ρ−ε2 a2ρ=1−1λf1 ∫0∞∑k=1KKk−1k−1exp−ε2ϖρx+ε2ka1ρ−ε2 a2ρλ1−xλf1 dx=1−∑k=1KKk−1k−1 υ1,
whereυ1=a1ρ−ε2 a2ρλ1a1ρ−ε2 a2ρλ1+ε2ϖρkλf1 exp−ε2ka1ρ−ε2 a2ρλ1.
From (16) and (17), we find the expressionΨ1
Ψ1=1−∑k=1KKk−1k−1λ2θkϖρλf2 +λ2exp−θkλ2×1−∑k=1KKk−1k−1 υ1.
Next,Ψ2can be calculated by
Ψ2=PrγSD2,k*PDMA<ε2∪maxγSD1←2,k*PDMA,χD2PDMA<ε1,γSD1,k*PDMA>ε1=PrγSD2,k*PDMA<ε2+PrmaxγSD1←2,k*PDMA,χD2PDMA<ε1︸D21−PrγSD2,k*PDMA<ε2∪maxγSD1←2,k*PDMA,χD2PDMA<ε1︸D22×PrγSD1,k*PDMA>ε1.
Interestingly, we have the following result:
PrγSD2,k*PDMA<ε2=1−PrγSD2,k*PDMA≥ε2=1−Prg2,k2≥ε2ϖρf22+ε2a2ρ=1−∑k=1KKk−1k−1a2ρλ2a2ρλ2+ε2ϖρkλf2 exp−ε2ka2ρλ2,
and
PrγSD1,k*PDMA>ε1=Prg1,k2>ε1ϖρf12+ε1a1ρ−ε1 a2ρ=1λf1 ∫0∞∑k=1KKk−1k−1exp−ε1ϖρx+ε1ka1ρ−ε1 a2ρλ1−xλf1 dx=∑k=1KKk−1k−1 ϑ1.
After this step, two lemmas as shown below need to be considered.
Lemma 1.
The closed-form expression ofD21is calculated as
D21=1−ρλh2 ρλh2 +ε1ϖρλf2 exp−ε1ρλh2 1−∑k=1KKk−1k−1ϑ2.
Proof.
See in Appendix B. □
Lemma 2.
D22is computed in closed-form by
D22=1−∑k=1KKk−1k−1a2ρλ2a2ρλ2+ε2ϖρkλf2 exp−ε2ka2ρλ2×1−∑k=1KKk−1k−1 ϑ21−ρλh2 ρλh2 +ε1ϖρλf2 exp−ε1ρλh2 .
Proof.
See in Appendix C. □
From (20)–(23) we find the expression ofΨ2as below:
Ψ2=1−∑k=1KKk−1k−1a2ρλ2a2ρλ2+ε2ϖρkλf2 exp−ε2ka2ρλ2+1−ρλh2 ρλh2 +ε1ϖρλf2 exp−ε1ρλh2 1−∑k=1KKk−1k−1ϑ2−1−∑k=1KKk−1k−1a2ρλ2a2ρλ2+ε2ϖρkλf2 exp−ε2ka2ρλ2×1−∑k=1KKk−1k−1 ϑ21−ρλh2 ρλh2 +ε1ϖρλf2 exp−ε1ρλh2 ×∑k=1KKk−1k−1 ϑ1.
From (18) and (24), the outage probability of D2D userD2can be examined through the formulation
OPD2−bi=1−∑k=1KKk−1k−1λ2θkϖρλf2 +λ2exp−θkλ2×1−∑k=1KKk−1k−1 υ1+1−∑k=1KKk−1k−1a2ρλ2a2ρλ2+ε2ϖρkλf2 exp−ε2ka2ρλ2+1−ρλh2 ρλh2 +ε1ϖρλf2 exp−ε1ρλh2 1−∑k=1KKk−1k−1ϑ2−1−∑k=1KKk−1k−1a2ρλ2a2ρλ2+ε2ϖρkλf2 exp−ε2ka2ρλ2×1−∑k=1KKk−1k−1 ϑ21−ρλh2 ρλh2 +ε1ϖρλf2 exp−ε1ρλh2 ×∑k=1KKk−1k−1 ϑ1.
4. Analysis On Asymptotic Outage Probability
Based on the previous results, an asymptotic analysis for bothD1andD2will be carried out to evaluate the outage behavior, i.e.,OPD1−biandOPD2−bi, respectively. Particularly, the following expressions are provide insight observation for the proposed system in the high SNR regime.
4.1. Asymptotic Outage Probability at D2D User 1
Based on the above analytical results in (12), by usinge−x≈1−xthe asymptotic outage probability of D2D User 1 with is given by
OPD1−asym=1−∑k=1KKk−1k−1a1−ε1 a2λ1kε1ϖλf1 +a1−ε1 a2λ11−ε1ka1ρ−ε1 a2ρλ1×1−∑k=1KKk−1k−1a1−ε1 a2λ2a1−ε1 a2λ2+ε1ϖkλf2 1−ε1ka1ρ−ε1 a2ρλ2+1−∑k=1KKk−1k−1a1−ε1 a2λ1a1−ε1 a2λ1+ε1ϖkλf1 1−ε1ka1ρ−ε1 a2ρλ1×1−λh1 λh1 +ε1ϖλf1 1−ε1ρλh1 ∑k=1KKk−1k−1a1−ε1 a2λ2a1−ε1 a2λ2+ε1ϖkλf2 1−ε1ka1ρ−ε1 a2ρλ2.
To look lower bound, whenρ→∞, the asymptotic outage probability of D2D User 1 with is determined by
OPD1−floor=1−∑k=1KKk−1k−1a1−ε1 a2λ1kε1ϖλf1 +a1−ε1 a2λ1×1−∑k=1KKk−1k−1a1−ε1 a2λ2a1−ε1 a2λ2+ε1ϖkλf2 +1−∑k=1KKk−1k−1a1−ε1 a2λ1a1−ε1 a2λ1+ε1ϖkλf1 ×1−λh1 λh1 +ε1ϖλf1 ∑k=1KKk−1k−1a1−ε1 a2λ2a1−ε1 a2λ2+ε1ϖkλf2 .
4.2. Asymptotic Outage Probability at D2D User 2
Similar to the derivation ofOPD1−asym, an asymptotic outage expression forOPD2−bi . It is noted that the related exact expression is presented in (25), now it can be derived as
OPD2−asym=1−∑k=1KKk−1k−1λ2θkϖρλf2 +λ21−θkλ2×1−∑k=1KKk−1k−1a1−ε2 a2λ1a1−ε2 a2λ1+ε2ϖkλf1 1−ε2ka1ρ−ε2 a2ρλ1+1−∑k=1KKk−1k−1a2 λ2a2 λ2+ε2ϖkλf2 1−ε2ka2ρλ2+1−λh2 λh2 +ε1ϖλf2 1−ε1ρλh2 1−∑k=1KKk−1k−1a1−ε1 a2λ2a1−ε1 a2λ2+ε1ϖkλf2 1−ε1ka1ρ−ε1 a2ρλ2−1−∑k=1KKk−1k−1a2 λ2a2 λ2+ε2ϖkλf2 1−ε2ka2ρλ2×1−∑k=1KKk−1k−1a1−ε1 a2λ2a1−ε1 a2λ2+ε1ϖkλf2 1−ε1ka1ρ−ε1 a2ρλ21−λh2 λh2 +ε1ϖλf2 1−ε1ρλh2 ×∑k=1KKk−1k−1a1−ε1 a2λ1a1−ε1 a2λ1+ε1ϖkλf1 1−ε1ka1ρ−ε1 a2ρλ1,
and with regard to lower bound, it can be obtained lower bound of userD2as
OPD2−floor=1−∑k=1KKk−1k−1λ2θkϖρλf2 +λ21−∑k=1KKk−1k−1a1−ε2 a2λ1a1−ε2 a2λ1+ε2ϖkλf1 +1−∑k=1KKk−1k−1a2 λ2a2 λ2+ε2ϖkλf2 +1−λh2 λh2 +ε1ϖλf2 1−∑k=1KKk−1k−1a1−ε1 a2λ2a1−ε1 a2λ2+ε1ϖkλf2 −1−∑k=1KKk−1k−1a2 λ2a2 λ2+ε2ϖkλf2 ×1−∑k=1KKk−1k−1a1−ε1 a2λ2a1−ε1 a2λ2+ε1ϖkλf2 1−λh2 λh2 +ε1ϖλf2 ×∑k=1KKk−1k−1a1−ε1 a2λ1a1−ε1 a2λ1+ε1ϖkλf1 .
Remark 1.
These approximate performances provide easy way to evaluate system performance rather than complex manner of derived expressions in term of outage probability. It is expected that these approximate expressions exhibits corresponding curves in simulation and they will match with exact curves achieved by analytical expressions presented in Section 3.
5. Numerical Results
In this section, numerical examples are performed to verify the outage performance of the downlink MISO PDMA network under Rayleigh fading channels with FD scheme. We denoted1,d2as distances between the BS and the first D2D user and the second one, repetitively. Such distance is normalized as unit. Moreover, Monte Carlo simulation is run in106times to compare with analytical results as proved in previous section.
In Figure 2, the outage probability versus transmit SNR at the BSρis presented in different power allocation parameters. We assume the distance between BS andD1isd1=0.4, path loss exponent isα=2, channel gainλ2=d2−α, whiled2=0.2,λh1 =λh2 =1,λf1 =λf2 =0.01, the number of antenna at BS isK=1. As a clear observation, the exact analytical results and simulation results are in excellent agreement, and the outage probability will be constant at high-SNR regimes. Moreover, as the transmit SNR increases, the outage probability decreases. Another important observation is that the outage probability for User 2D2outperforms User 1D1 . Figure 3 shows outage performance for userD1. The parameters for this case area1=0.7,λ1=d1−α,d1=0.4,α=2,λ2=d2−α,d2=0.2,λh1 =λh2 =1,λf1 =λf2 =0.01,K=1. It can be seen that lower target rateR1results in better outage performance. It is intuitively that floor outage values match with analytical curves at highρ. Such observation confirms our analysis on finding lower bound of outage probability. While asymptotic lines also match with exact lines at several points within the range of considered transmit SNR at the BS.
In Figure 4, the outage probabilities are shown as a function of the transmit SNR. Reported from the impact of target rateR2, there is a decrease in outage probability for such user as change to lower level ofR2. This figure requires several parameters asa1=0.7,R1=0.5,λ1=d1−α,d1=0.4,α=2,λ2=d2−α,d2=0.2,λh1 =λh2 =1,λf1 =λf2 =0.01,K=1 . Similar trends with Figure 3 in terms of approximate and floor value of outage forD2can be observed in this figure.
Figure 5 plots the outage probability versus SNR with the different numbers of transmit antennas at the BS (other parameters as declarations in Figure 5 asa1=0.7,R1=0.5,λ1=d1−α,d1=0.4.α=2,λ2=d2−α,d2=0.2,λh1 =λh2 =1,λf1 =λf2 =0.01). More antennas at the BS indicates better outage probability in such PDMA.K=3case provides the best performance and an important observation in this study.
Due to self-interference related to FD scheme at users, it need be considered performance of userD1in four cases ofλf1 as observation in Figure 6. In this case, we seta1=0.7,R1=0.5,λ1=d1−α,d1=0.4,α=2,λ2=d2−α,d2=0.2,λh1 =λh2 =1,K=1 for both Figure 6 and Figure 7. It is noted thatλf2=0.01,λf1 =0.01 for Figure 6, Figure 7, respectively. Obviously, strong self-interference makes outage performance worse. The main reason is that achievable SNR will be smaller as existence of self-interference and hence outage event easily happens. Similarly, performance ofD2 in Figure 7 is changed as varyingλf2 .
6. Conclusions
This paper analytically investigated the impact of number of transmit antennas at the BS on outage performance of each D2D user in the MISO PDMA. Closed-form analytical expressions for the outage probability were obtained. Our theoretical analysis indicated that the outage performance gap between two D2D users exists due to different power allocation factors given. The best performance can be raised at a higher number of transmit antennas at the BS. Furthermore, we observed that target rates have only a small impact on outage performance.
[Image omitted. See PDF.]
[Image omitted. See PDF.]
[Image omitted. See PDF.]
[Image omitted. See PDF.]
[Image omitted. See PDF.]
[Image omitted. See PDF.]
[Image omitted. See PDF.]
Author Contributions
D.T.D. provided idea, wrote paper and verified expressions, M.S.V.N. and T.A.H. derived mathematical problems and performed experiments; B.M.L. contributed to prepare manuscript and delivered valuable comments.
Funding
This work was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by Korea government (MSIT) (Grant No.: NRF-2017R1D1A1B03028350).
Conflicts of Interest
The authors declare no conflict of interest.
Appendix A.
Proof of Proposition 1.
The termsB1andB2 can be calculated with the help of (2) and (3). The former becomes
B1=PrγSD1,k*PDMAε1,γSD1←2,k*PDMAε1=1−PrγSD1,k*PDMA≥ε1︸B111−PrγSD1←2,k*PDMA≥ε1︸B12.
Therefore,B11can be expressed as
B11=1−PrγSD1,kPDMA≥ε1=1−Prg1,k2≥ε1ϖρf12+ε1a1ρ−ε1 a2ρ=1−1λf1 ∫0∞∑k=1KKk−1k−1exp−ε1ϖρx+ε1ka1ρ−ε1 a2ρλ1−xλf1 dx=1−∑k=1KKk−1k−1ϑ1,
whereϑ1=a1ρ−ε1 a2ρλ1kε1ϖρλf1 +a1ρ−ε1 a2ρλ1exp−ε1ka1ρ−ε1 a2ρλ1.
It is noted thatλ1is average channel gain ofg1,k, thenλ2is average channel gain ofg2,k,λf1,λf2are average channel gain off1,f2, respectively;λh1,λh2are average channel gains ofh1,h2, respectively.
Similarly,B12can be expressed by
B12=1−PrγSD1←2,kPDMA≥ε1=1−Prg2,k2≥ε1ϖρf22+ε1a1ρ−ε1 a2ρ=1−1λf2 ∫0∞∑k=1KKk−1k−1exp−ε1ϖρy+ε1ka1ρ−ε1 a2ρλ2−yλf2 dy=1−∑k=1KKk−1k−1 ϑ2,
whereϑ2=a1ρ−ε1 a2ρλ2a1ρ−ε1 a2ρλ2+ε1ϖρkλf2 exp−ε1ka1ρ−ε1 a2ρλ2.
From (A2) and (A3) we find the expressionB1as
B1=1−∑k=1KKk−1k−1ϑ11−∑k=1KKk−1k−1 ϑ2.
In similar way,B2can be computed as
B2=PrmaxγSD1,k*PDMA,χD1PDMAε1,γSD1←2,k*PDMA>ε1=PrγSD1,k*PDMAε1PrχD1PDMAε1PrγSD1←2,k*PDMA>ε1=1−PrγSD1,k*PDMA≥ε1︸B211−PrχD1PDMA≥ε1︸B22×PrγSD1←2,k*PDMA>ε1︸B23.
In this step,B21is formulated as
B21=PrγSD1,k*PDMA≥ε1=Prg1,k2≥ε1ϖρf12+ε1a1ρ−ε1 a2ρ=1λf1 ∫0∞∑k=1KKk−1k−1exp−ε1ϖρx+ε1ka1ρ−ε1 a2ρλ1−xλf1 dx=∑k=1KKk−1k−1 ϑ1.
Then,B22is calculated as
B22=PrχD1PDMA≥ε1=Prh12≥ε1ϖρf12+ε1ρ=∫0∞exp−ε1ϖρx+ε1ρλh1 1λf1 exp−xλf1 dx=1λf1 exp−ε1ρλh1 ∫0∞exp−ε1ϖρρλh1 +1λf1 xdx=ρλh1 ρλh1 +ε1ϖρλf1 exp−ε1ρλh1 .
Similarly,B23is calculated as
B23=PrγSD1←2,k*PDMA>ε1=Prg2,k2>ε1ϖρf22+ε1a1ρ−ε1 a2ρ=1λf2 ∫0∞∑k=1KKk−1k−1exp−ε1ϖρy+ε1ka1ρ−ε1 a2ρλ2−yλf2 dy=∑k=1KKk−1k−1 ϑ2.
From (A6), (A7) and (A8) we find the expressionB2to be
B2=1−∑k=1KKk−1k−1 ϑ1×1−ρλh1 ρλh1 +ε1ϖρλf1 exp−ε1ρλh1 ∑k=1KKk−1k−1 ϑ2.
This completes the proof of Proposition 1. □
Appendix B.
Proof of Lemma 1.
D21=1−PrχD2PDMA≥ε1︸κ11−PrγSD1←2,kPDMA≥ε1︸κ2.
Here,κ1can be calculated as
κ1=1−PrχD2PDMA≥ε1=1−Prh22≥ε1ϖρf22+ε1ρ=1−1λf2 ∫0∞exp−ε1ϖρy+ε1ρλh2 −yλf2 dy=1−ρλh2 ρλh2 +ε1ϖρλf2 exp−ε1ρλh2 .
Similarly,κ2can be calculated as
κ2=1−PrγSD1←2,kPDMA≥ε1=1−Prg2,k2≥ε1ϖρf22+ε1a1ρ−ε1 a2ρ=1−1λf2 ∫0∞∑k=1KKk−1k−1exp−ε1ϖρy+ε1ka1ρ−ε1 a2ρλ2−yλf2 dy=1−∑k=1KKk−1k−1ϑ2.
This completes the proof of Lemma 1. □
Appendix C.
Proof of Lemma 2.
By definition, we have following outage probability:
D22=PrγSD2,k*PDMAε2∪maxγSD1←2,k*PDMA,χD2PDMAε1=1−PrγSD2,kPDMA≥ε2︸Ξ11−PrγSD1←2,kPDMA≥ε1︸Ξ2×1−PrχD2PDMA≥ε1︸Ξ3.
Firstly,Ξ1can be calculated as
Ξ1=1−PrγSD2,kPDMA≥ε2=1−Prg2,k2≥ε2ϖρf22+ε2a2ρ=1−1λf2 ∫0∞∑k=1KKk−1k−1exp−ε2ϖρy+ε2ka2ρλ2−yλf2 dy=1−∑k=1KKk−1k−1a2ρλ2a2ρλ2+ε2ϖρkλf2 exp−ε2ka2ρλ2.
Similarly,Ξ2can be calculated as
Ξ2=1−PrγSD1←2,kPDMA≥ε1=1−Prg2,k2≥ε1ϖρf22+ε1a1ρ−ε1 a2ρ=1−1λf2 ∫0∞∑k=1KKk−1k−1exp−ε1ϖρy+ε1ka1ρ−ε1 a2ρλ2−yλf2 dy=1−∑k=1KKk−1k−1 ϑ2.
It is noted thatΞ3can be formulated as
Ξ3=1−PrχD2PDMA≥ε1=1−Prh22≥ε1ϖρf22+ε1ρ=1−1λf2 ∫0∞exp−ε1ϖρy+ε1ρλh2 −yλf2 dy=1−ρλh2 ρλh2 +ε1ϖρλf2 exp−ε1ρλh2 .
This completes the proof of Lemma 2. □
1. Do, D.-T.; Nguyen, H.-S.; Voznak, M.; Nguyen, T.-S. Wireless powered relaying networks under imperfect channel state information: System performance and optimal policy for instantaneous rate. Radioengineering 2017, 26, 869–877.
2. Nguyen, X.-X.; Do, D.-T. Optimal power allocation and throughput performance of full-duplex DF relaying networks with wireless power transfer-aware channel. EURASIP J. Wirel. Commun. Netw. 2017, 2017, 152.
3. Nguyen, X.-X.; Do, D.-T. Maximum Harvested Energy Policy in Full-Duplex Relaying Networks with SWIPT. Int. J. Commun. Syst. 2017, 30, e3359.
4. Nguyen, T.-L.; Do, D.-T. A new look at AF two-way relaying networks: Energy harvesting architecture and impact of co-channel interference. Ann. Telecommun. 2017, 72, 669–678.
5. Wong, V.W.S.; Schober, R.; Ng, D.W.K.; Wang, L.-C. Key Technologies for 5G Wireless Systems, 1st ed.; Cambridge University Press: Cambridge, UK, 2017.
6. Zhu, J.; Wang, J.; Huang, Y.; He, S.; You, X.; Yang, L. On Optimal Power Allocation for Downlink Non-Orthogonal Multiple Access Systems. IEEE J. Select. Areas Commun. 2017, 35, 2744–2757.
7. Chen, Z.; Ding, Z.; Dai, X.; Karagiannidis, G.K. On the Application of Quasi-Degradation to MISO-NOMA Downlink. IEEE Trans. Signal Process. 2016, 64, 6174–6189.
8. Chen, X.; Zhang, Z.; Zhong, C.; Ng, D.W.K. Exploiting Multiple Antenna Techniques for Non-Orthogonal Multiple Access. IEEE J. Select. Areas Commun. 2017, 35, 2207–2220.
9. Do, D.-T.; Nguyen, M.-S.V.; Hoang, T.-A.; Voznak, M. NOMA-Assisted Multiple Access Scheme for IoT Deployment: Relay Selection Model and Secrecy Performance Improvement. Sensors 2019, 19, 736.
10. Do, D.-T.; Le, C.-B. Application of NOMA in Wireless System with Wireless Power Transfer Scheme: Outage and Ergodic Capacity Performance Analysis. Sensors 2018, 18, 3501.
11. Nguyen, T.-L.; Do, D.-T. Power Allocation Schemes for Wireless Powered NOMA Systems with Imperfect CSI: System model and performance analysis. Int. J. Commun. Syst. 2018, 31, e3789.
12. Nguyen, T.-L.; Do, D.-T. Exploiting Impacts of Intercell Interference on SWIPT-assisted Non-orthogonal Multiple Access. Wirel. Commun. Mob. Comput. 2018, 2018.
13. Molish, A.F.; Win, M.Z. Capacity of MIMO systems with antenna selection. IEEE Trans. Wirel. Commun. 2005, 4, 1759–1772.
14. Thoen, S.; Perre, L.V.; Gyselinckx, B.; Engels, M. Performance analysis of combined transmit-SC/receive-MRC. IEEE Trans. Commun. 2001, 49, 5–8.
15. Mumtaz, S.; Huq, K.M.S.; Rodriguez, J. Direct mobile-to-mobile communication: Paradigm for 5G. IEEE Wirel. Commun. 2014, 21, 14–23.
16. Doppler, K.; Rinne, M.; Wijting, C.; Ribeiro, C.B.; Hugl, K. Device-todevice communication as an underlay to LTE-advanced networks. IEEE Commun. Mag. 2009, 47, 42–49.
17. Lei, L.; Zhong, Z.; Lin, C.; Shen, X. Operator controlled device-to-device communications in LTE-advanced networks. IEEE Wirel. Commun. 2012, 19, 96–104.
18. Asadi, A.; Mancuso, V. Network-assisted outband D2D-clustering in 5G cellular networks: Theory and practice. IEEE Trans. Mob. Comput. 2017, 16, 2246–2259.
19. Tseng, H.-W.; Yu, Y.-J.; Wu, B.-S.; Kuo, C.-F.; Chen, P.-S. A resource allocation scheme for device-to-device communication over ultra-dense 5G cellular networks. In Proceedings of the 2017 International Conference on Applied System Innovation (ICASI), Sapporo, Japan, 13–17 May 2017; pp. 80–83.
20. Ma, R.; Chang, Y.-J.; Chen, H.-H.; Chiu, C.-Y. On relay selection schemes for relay-assisted D2D communications in LTE-A systems. IEEE Trans. Veh. Technol. 2017, 66, 8303–8314.
21. Tehrani, M.N.; Uysal, M.; Yanikomeroglu, H. Device-to-device communication in 5G cellular networks: Challenges, solutions, and future directions. IEEE Commun. Mag. 2014, 52, 86–92.
22. Lien, S.-Y.; Chien, C.-C.; Liu, G.S.-T.; Tsai, H.-L.; Li, R.; Wang, Y.J. Enhanced LTE device-to-device proximity services. IEEE Commun. Mag. 2016, 54, 174–182.
23. Osseiran, A.; Boccardi, F.; Braun, V.; Kusume, K.; Marsch, P.; Maternia, M.; Queseth, O.; Schellmann, M.; Schotten, H.; Taoka, H.; et al. Scenarios for 5G mobile and wireless communications: The vision of the METIS project. IEEE Commun. Mag. 2014, 52, 26–35.
24. Madani, N.; Sodagari, S. Performance Analysis of Non-Orthogonal Multiple Access With Underlaid Device-to-Device Communications. IEEE Access 2018, 6, 39820–39826.
25. Bithas, P.S.; Maliatsos, K.; Foukalas, F. An SINR-Aware Joint Mode Selection, Scheduling, and Resource Allocation Scheme for D2D Communications. IEEE Trans. Veh. Technol. 2019.
26. Zheng, H.; Hou, S.; Li, H.; Song, Z.; Hao, Y. Power Allocation and User Clustering for Uplink MC-NOMA in D2D Underlaid Cellular Networks. IEEE Wirel. Commun. Lett. 2018, 7, 1030–1033.
27. Diao, X.; Zheng, J.; Wu, Y.; Cai, Y. Joint Computing Resource, Power, and Channel Allocations for D2D-Assisted and NOMA-Based Mobile Edge Computing. IEEE Access 2019, 7, 9243–9257.
1Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City 700000, Vietnam
2Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh City 700000, Vietnam
3School of Intelligent Mechatronics Engineering, Sejong University, Seoul 05006, Korea
*Authors to whom correspondence should be addressed.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2019. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
In this paper, we investigate power domain division-based multiple access (PDMA) to support the base stations (BS) equipped with multiple antennas to serve mobile users. Such a system deploys multiple input single output (MISO)-based wireless transmission and a full-duplex (FD) scheme. Furthermore, such MISO PDMA system consists of BS employing transmit antenna selection to reduce complexity in signal processing at the receivers. We distinguish two kinds of mobile users, device-to-device (D2D) users and traditional users. In such MISO PDMA, there exists a trade-off between outage performance of each PDMA user and power allocation factors. Since the implementation of the FD scheme at PDMA users, bandwidth efficiency will be enhanced despite the existence of self-interference related to such FD. In particular, exact expressions of outage probability are derived to exhibit system performance with respect to D2D users. Finally, valuable results from the simulated parameters together with the analytical results show that MISO PDMA can improve its performance by increasing the number of transmit antennas at the BS.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer