
Citation: | LI Xingwang, GAO Xuesong, LIU Yingting, HUANG Gaojian, ZENG Ming, QIAO Dawei. Overlay CR-NOMA Assisted Intelligent Transportation System Networks with Imperfect SIC and CEEs[J]. Chinese Journal of Electronics, 2023, 32(6): 1258-1270. DOI: 10.23919/cje.2022.00.071 |
As the key enabling technology of the future intelligent transportation systems (ITS), Internet-of-vehicles (IoV) will greatly promote the development of society towards intelligence and informatization [1], [2]. Generally, IoV communication includes vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I) and the vehicle-to-person (V2P) [3]. With the rapid development of the sixth generation (6G) mobile communication, the IoV of ITS networks driven by 6G can achieve higher data transmission rate, lower latency and higher quality-of-service (QoS) [4], [5]. However, it also faces great challenges, such as spectrum shortage and large-scale connections [6]. In order to effectively solve the above problems, some promising technologies have been proposed, such as non-orthogonal multiple access (NOMA) [7] and cognitive radio [8].
NOMA is considered as a key technology in 6G since it can improve the spectral efficiency and reduce the latency by serving massive devices in the same resource block (time/frequency/code) using power multiplexing [9]. Moreover, at the transmitting side, the transmitter allocates different power to different users according to their channel conditions and carries out superposition coding. At the receiving side, the signal is detected through the successive interference cancelation (SIC) technology [10]. And specifically, NOMA can ensure fairness among the served users by allocating different users with different powers [11].
There are numerous excellent research focusing on the investigations of NOMA in wireless networks [12]-[18]. The authors in [12] proposed a general framework to evaluate a downlink NOMA system performance. The authors in [13] studied the reliable performance of a downlink NOMA system under the conditions of second-order statistics of channel state information (CSI). In [14], Lu et al. designed a multi-carrier NOMA system for video transmission to meet the growing demands for video services such as massive traffic and low latency. The authors in [15] investigated the performance of NOMA-enabled unmanned aerial vehicle (UAV) relay networks by deducing the outage probability (OP) and ergodic capacity for both amplify-and-forward (AF) and decode-and-forward (DF) relaying protocols at UAV. The authors in [16] studied the effective capacity of a reconfigurable intelligent surfaces aided NOMA system. Xu et al. [17] proposed a cognitive orthogonal frequency-division multiplexing-NOMA network to increase the system capacity. To support ultra-reliability, high throughput and multiple concurrent connections, reference [18] investigated the variation of the diversity order of OP relative to the transmit power in a hybrid automatic repeat request assisted NOMA system.
Cognitive radio (CR) is another promising technology to improve the frequency spectrum utilization [8], [19]. In the CR networks, the secondary network is allowed to selectively access the authorized frequency spectrum of the primary network to solve the problem of insufficient spectrum [20]. According to the spectrum access paradigms, interweave, underlay, overlay are the three most popular CR models [21]. In interweave model, the secondary user (SU) is allowed to access the authorized frequency bands only when primary user (PU) does not occupy it. Underlay cognitive radio allows the primary and secondary users to transmit messages simultaneously in the same frequency band, but the interference to the primary user needs to be less than a predefined value [22]. In overlay mode, the secondary network uses part of the energy to help the primary network transmit and obtain the right to access the authorized spectrum, and it improves the performance of the primary network while realizing the simultaneous transmission of the primary and secondary networks [23].
Scanning the technical literature of recent years, the performance of CR network was discussed in many literature since CR technology can mitigate the shortage of spectrum resources to a certain extent [24]-[28]. In [24], the authors derived the analytical expression of OP and ergodic rate (ER) so as to compare the throughput performance of CR networks based on interweave and underlay. In more detail, to maximize the throughput of SU, Wang et al.. [25] proposed a channel-and-sensing-aware channel access strategy for an interweave cognitive network. In [26], the authors discussed the influence of improper Gaussian signaling on the underlay CR network performance. The authors in [27] designed a novel scheme of spatial modulation in overlay CR network and analyzed the system performance by calculating average symbol error rate. The authors in [28] designed a scheme about optimal transmitting power for underlay CR network to minimize the average symbol error probability.
To address the challenges of the exponentially growing demand for mobile traffic [29], many researchers introduced the CR technology into the NOMA networks, see references [30]-[34]. Liu et al. [30] deduced the analytical expression of OP by means of stochastic geometry in order to characterize the reliable performance of the proposed CR-NOMA network. Wei et al. [31] deduced the analytical expressions of the secrecy sum rate to study the secrecy performance of a NOMA-enabled underlay CR network. The authors in [32] analyzed the performance of a NOMA assisted underlay CR network by deriving the analytical expression of pairwise error probability of SU. The authors in [33] proposed a novel spectrum sharing framework for multiuser CR-NOMA network to effectively improve the spectrum efficiency. In [34], the authors optimized the power allocation of the proposed spectrum leasing scheme for CR network so that the QoS of the primary network has been met while maximizing the performance of the secondary network.
Based on the above discussions, the existing studies are mostly conducted under ideal conditions. However, the actual communication process is generally carried out under the non-ideal conditions, such as imperfect successive interference cancellation (ipSIC) and non-ideal CSI. ipSIC is produced by channel state information unattainable, receiver performance limitation or synchronization errors, residual impairments and error propagation during transmission, etc. [35]-[40], and the channel estimation errors (CEEs) result in non-ideal CSI. Chen et al. [36] designed a novel algorithm to reduce the influence of ipSIC on the considered system performance. In [37], the authors investigated the reliable and ergodic performance of a multi-input multi-output (MIMO) interference networks under the condition of non-ideal CSI. Yang et al. [38] studied the effect of non-ideal CSI on secrecy performance of multi-user massive MIMO networks. The authors in [39] considered nonlinear multi-objective optimization problem under ipSIC in order to maximize the sum capacity and minimize the total transmit power under the constraint of QoS. Further, the authors in [40] analyzed the influence of ipSIC, non-ideal CSI and imperfect timing synchronization on a space time block code-based NOMA network simultaneously.
Although many researchers have conducted studies on NOMA, CR, imperfect SIC and non-ideal CSI, the joint impacts of the above factors on system performance are rarely studied. Sun et al. in [41] modeled a NOMA vehicular communication network, and deduced the analytical expression for the OP of the considered network. However, the non-ideal CSI, ipSIC and CR network were not involved. On the premise of ensuring quality-of-service, Xiao et al in [42] optimized transmission time and power control for the proposed radio-frequency-powered CR network to achieve maximum energy efficiency. Unfortunately, NOMA was not taken into consideration. The authors in [43] studied a CR-NOMA network and proposed a new dynamic power transmission scheme to guarantee the QoS of the considered system. The fly in the ointment was that non-ideal CSI has not been taken into account. Li et al. assessed the reliability and security of cooperative NOMA and non-cooperative NOMA systems by calculating secrecy outage probability and connection outage probability in [44]. However, ipSIC and non-ideal CSI were not taken into account. Luo et al. analyzed the performance of a cognitive NOMA system, and deduced the analytical expression of OP and throughput under high SNR regions in [45], but the non-ideal CSI was not considered. The authors in [46] analyzed and optimized the OP and throughput of the proposed underlay CR-NOMA in the presence of ipSIC. However, non-ideal CSI was not included. In [47], the authors proposed a CR assisted-NOMA network based on ITS and evaluated the reliability of the considered network by analyzing OP and throughput. Nonetheless, the ergodic performance of the network was not considered. The authors in [48] introduced wireless power transmission into CR-NOMA network to solve the challenges of energy consumption and large-scale connection in ITS. The fly in the ointment was that non-ideal CSI has not been mentioned.
In order to fill these bridges, considering CEEs and ipSIC, we introduce a NOMA-based overlay CR (OCR) ITS system. In the considered system, the SR utilizes the spectrum resources of the primary network to transmit its own information. In return, the SU acts as a relay to transmit the information of the primary network to the primary receivers. The main contributions of this paper are as following.
• We propose a novel NOMA-based OCR system for the ITS, which consists of a primary vehicle network and a secondary vehicle network. In the primary network, the primary transmitter sends superimposed information to both the primary and secondary receiving vehicles. In the secondary network, the secondary receiving vehicle receives their own information and acts as the relay of the primary network to transmit information to the primary receiving vehicles. Moreover, in order to make the work more realistic, we consider the CEEs and ipSIC. Specifically, two channel estimation models are considered: i) The CEEs is a fixed constant; ii) The CEEs is a function related to the SNR.
• We evaluate the reliability performance of the system under consideration by deducing the analytical expressions of the OP. In order to obtain more precise insights, the asymptotic expressions of the OP at high SNR regions are analyzed. The derivations show that increasing transmit SNR enhances the reliability of the consideration system and the OP exists an error floor because of the constant estimation error.
• The ergodic sum rate (ESR) of primary and secondary network are derived through a series of calculations to evaluate the ergodicity of the ITS system. In addition, the asymptotic expressions of ESR at high SNR regions are also performed. These results indicate that increasing SNR enhances the system ergodicity and the value of ESR tends to a constant at high SNR regime.
Here are some notations about this paper.
As illustrated in Fig.1, we consider a NOMA-based OCR system of ITS, which consists of a primary transmitter (PT), a marginal vehicle (PR1), a stronger vehicle (PR2) in primary network, a secondary transmitter (ST), and a secondary receiving vehicle (SR) in secondary network. It is assumed that: i) All nodes are equipped with one antenna; ii) All channels follow the independent Rayleigh fading.
It is difficult to obtain perfect CSI due to some practical factors, so the channel estimation method is introduced. By using linear minimum mean square error (LMMSE), the channel coefficient can be written as follows [49]:
hi=ˆhi+ei | (1) |
where
As in [50], we consider two channel estimation models:
1)
2)
The whole communication process is divided into two slots.
PT transmits the superimposed signal to PR1, PR2 and SR through power domain multiplexing, and thus, the signal received at PR1 can be written as
ypp1=(ˆhpp1+epp1)(√α1Ppxp,1+√α2Ppxp,2)+npp1 | (2) |
where
PR1 decodes
γpp1xp,1=|ˆhpp1|2α1ρp|ˆhpp1|2α2ρp+σ2epp1ρp+1 | (3) |
where
The signal received in PR2 can be expressed as
ypp2=(ˆhpp2+epp2)(√α1Ppxp,1+√α2Ppxp,2)+npp2 | (4) |
where
PR2 first decodes
γpp2xp,1=|ˆhpp2|2α1ρp|ˆhpp2|2α2ρp+σ2epp2ρp+1 | (5) |
In practice, the receiver always have some types of errors in transmitting and detecting process, such as synchronization error, residual impairments or intrinsic constraints, therefore we assume ipSIC happens at PR2. The SINR of decoding
γpp2xp,2=|ˆhpp2|2α2ρpζ1|ˆhpp2|2α1ρp+σ2epp2ρp+1 | (6) |
where
The signal received at SR can be denoted as
yps1=(ˆhps1+eps1)(√α1Ppxp,1+√α2Ppxp,2)+nps1 | (7) |
where
SR needs to decode the message
γps1xp,1=|ˆhps1|2α1ρp|ˆhps1|2α2ρp+σ2eps1ρp+1 | (8) |
γps1xp,2=|ˆhps1|2α2ρpζ2|ˆhps1|2α1ρp+σ2eps1ρp+1 | (9) |
where
During the second slot, SR receives the message
The two phases of receiving and decoding-and-forward the message are performed in the same resource block.
The signal received at SR can be written as
yss1=(ˆhss1+ess1)√Psxs+nss1 | (10) |
where
When decoding
γss1xs=|ˆhss1|2ρsσ2ess1ρs+1 | (11) |
where
The received signals at PR1 can be denoted by
ys1p1=(ˆhs1p1+es1p1)(√α3Ps1xp,1+√α4Ps1xp,2)+ns1p1 | (12) |
where
PR1 only decodes
γs1p1xp,1=|ˆhs1p1|2α3ρs1|ˆhs1p1|2α4ρs1+σ2es1p1ρs1+1 | (13) |
where
The received signals at PR2 can be represented as
ys1p2=(ˆhs1p2+es1p2)(√α3Ps1xp,1+√α4Ps1xp,2)+ns1p2 | (14) |
where
PR2 needs to decode the message
γs1p2xp,1=|ˆhs1p2|2α3ρs1|ˆhs1p2|2α4ρs1+σ2es1p2ρs1+1 | (15) |
γs1p2xp,2=|ˆhs1p2|2α4ρs1ζ3|ˆhs1p2|2α3ρs1+σ2es1p2ρs1+1 | (16) |
where
The OP and ESR are the two important evaluation metrics of wireless communication systems. In this section, we study the reliability and ergodicity by calculating OP and ESR, and analyze the asymptotic expressions of OP and ESR at high SNR region.
There are three conditions that the outage event occurs at PR1 according to the NOMA protocol: i) PR1 fails to decodes
PPR1out=(1−Pr(γpp1xp,1>γth1))×(1−Pr(min(γps1xp,1γth1,γps1xp,2γth2,γs1p1xp,1γth1)>1)) | (17) |
where
Theorem 1 The analytical expression of OP at PR1 is presented as
PPR1out=(1−e−M1λpp1)(1−e−M4λps1−M5λs1p1) | (18) |
if
Proof See Appendix A.
Corollary 1 At high SNRs (
PPR1out,∞=(1−e−M6λpp1)(1−e−M9λps1−M10λs1p1) | (19) |
where
There are three conditions when PR2 encounters outage event: i) PR2 cannot decodes
PPR2out=(1−Pr(min(γpp2xp,1γth1,γpp2xp,2γth2)>1))×(1−Pr(min(γps1xp,1γth1,γps1xp,2γth2,γs1p2xp,1γth1,γs1p2xp,2γth2)>1)) | (20) |
Theorem 2 The analytical expression of OP at PR2 can be written as
PPR2out=(1−e−M13λpp2)(1−e−M4λps1−M16λs1p2) | (21) |
if
Proof See Appendix B.
Corollary 2 At high SNRs (
PPR2out,∞=(1−e−M19λpp2)(1−e−M9λps1−M22λs1p2) | (22) |
In (22),
The outage event will happen when SR fails to decode the message
PSRout=1−Pr(γss1xs>γths) | (23) |
where
Theorem 3 The analytical expression of OP at SR can be written as
PSRout=1−e−M23λss1 | (24) |
where
Proof See Appendix C.
Corollary 3 At high SNRs (
PSRout,∞=1−e−γthsσ2ess1λss1 | (25) |
To gain further insight, we discuss the diversity order of PR1, PR2 and SR. According to [7], the diversity order is defined as
d=−limρ→∞log(Pout,∞)logρ | (26) |
Corollary 4 The diversity orders of PR1, PR2 and SR can be represent as
dPR1=dPR2=dSR=0 | (27) |
Remark 1 From Corollary 1, Corollary 2 and Corollary 3, we can find that when the transmitted SNR approaches infinity, the asymptotic OPs of PR1, PR2 and SR become a fixed constant, indicating that the OP has an error floor, yielding the diversity order to be 0.
The ESR of primary network can be expressed as
Rp=RPR1+RPR2 | (28) |
The ergodic rates (ERs) for PR1 and PR2 are inferred as follows.
The ER of PR1 can be written as
RPR1=E[12log2(1+W)] | (29) |
where
Theorem 4 The analytical expression of ER at PR1 can be written as
RPR1=12ln2πN2kk∑i=02√1−ϕi22+N(ϕi+1)e−M28−M29−M30 | (30) |
where
Proof See Appendix D.
Corollary 5 At high SNRs (
R∞PR1=12ln2πN2kk∑i=02√1−ϕi22+N(ϕi+1)e−M31−M32−M33 | (31) |
where
The ER of PR2 can be represented as
RPR2=E[12log2(1+Z)] | (32) |
where
Theorem 5 The analytical expression of ER at PR2 is given by
RPR2=12ln2πN22kk∑i=02√1−ϕi22+N2(ϕi+1)e−M37−M38−M39 | (33) |
where
Proof See Appendix E.
Corollary 6 At high SNRs (
R∞PR2=12ln2πN22kk∑i=02√1−ϕi22+N2(ϕi+1)e−M40−M41−M42 | (34) |
where
Theorem 6 The ESR of primary network can be expressed as
Rp=π4ln2(Nkk∑i=02√1−ϕi22+N(ϕi+1)e−M28−M29−M30+N2kk2∑i=02√1−ϕi22+N2(ϕi+1)e−M37−M38−M39) | (35) |
Corollary 7 At high SNRs (
R∞P=π4ln2(Nkk∑i=02√1−ϕi22+N(ϕi+1)e−M31−M32−M33+N2kk∑i=02√1−ϕi22+N2(ϕi+1)e−M40−M41−M42) | (36) |
The ESR of secondary network can be expressed as
RS=E[12log2(1+γss1xs)] | (37) |
Theorem 7 The ESR of secondary network is given by
RS=−12ln2e−(σ2ess1ρs+1)λss1ρsEi(−(σ2ess1ρs+1)λss1ρs) | (38) |
Proof See Appendix F.
Corollary 8 At high SNRs (
R∞S=−12ln2e−σ2ess1λss1Ei(−σ2ess1+1λss1) | (39) |
Remark 2 From Corollary 7 and Corollary 8, we found that when the transmitted SNR approaches infinity, the asymptotic ESRs of primary network and secondary network become a fixed constant, implying that there exists a ceiling for ESR due to CEEs.
In this section, we offer some numerical results to verify the correctness of the analysis in Section III, and these results are obtained based on the
Channel estimation error | σ2epp1=σ2epp2=σ2eps1=σ2ess1=σ2es1p1=σ2es1p2=0.01 |
Estimated channel coefficient | {λpp1,λpp2,λps1,λss1,λs1p1,λs1p2}={0.1,0.5,2,0.1,4,3} |
Power allocation coefficient | α1=α3=0.9,α2=α4=0.1 |
Noise power | Nn=1 |
Imperfect SIC | {ζ1,ζ2,ζ3}=0.001 |
Targeted date rate | {γth1,γth2,γths}={1,1,2} |
Fig.2 shows the OP curves of the users under the ideal and non-ideal conditions. For the purpose of comparison, the parameter settings under the ideal conditions are provided, and the variances of CEEs are
Fig.3 provides the curves of OP versus SNR under two channel estimation models: i) the channel estimation error is a fixed constant; ii) the channel estimation error is a function of the SNR. As can be seen from Fig.3, the theoretical analysis curves are in consistence with the simulation results, validating the accuracy of our analysis. For the first model, the OP is a fixed constant in the high SNR regimes, while for the second mode, the OP decrease as the SNR grows large. This is because that when the SNR grows large, the estimated channel gradually approaches the real channel, yielding improves reliable performance.
Fig.4 plots the OPs of users versus power allocation parameter
Fig.5 shows the ESR versus SNR. We set
Fig.6 represents the relationship between ESR and transmitting SNR under the above mentioned two CEEs models. In this simulation, we set
The relationship between ER and
To improve the spectral efficiency, we proposed a NOMA-based OCR system for ITS. The reliability and ergodicity of the proposed system were analyzed by considering ipSIC and two channel estimation models. We derived the analytical expressions of the OP and ESR, as well as the asymptotic expressions of OP and ESR at the high SNR region. A series of simulations were carried out to verify the accuracy of the analysis. In addition, the effect of a series of related parameters on the system performance were investigated through simulation.
The proof starts by substituting equations (3), (8), (9), (13) into (17), the OP for PR1 can be written
PPR1out=(1−Pr(γpp1xp,1>γth1))⏟I1×(1−Pr(min(γps1xp,1γth1,γps1xp,2γth2,γs1p1xp,1γth1)>1))⏟I2 |
where
I1=1−Pr(γpp1xp,1>γth1)=1−Pr(|ˆhpp1|2>M1)=1−e−M1λpp1 |
and
I2=1−Pr(min(γps1xp,1γth1,γps1xp,2γth2,γs1p1xp,1γth1)>1)=1−Pr(γps1xp,1>γth1,rps1xp,2>γth2,γs1p1xp,1>γth1)=1−Pr(|ˆhps1|2>M2,|ˆhps1|2>M3,|ˆhs1p1|2>M5)=1−Pr(|ˆhps1|2>M4,|ˆhs1p1|2>M5)=1−e−M4λps1−M5λs1p1 |
The proof starts by substituting equations (5), (6), (8), (9), (15), (16) into (20), the OP for PR2 can be written as
PPR2out=(1−Pr(min(γpp2xp,1γth1,γpp2xp,2γth2)>1))⏟I3×(1−Pr(min(γps1xp,1γth1,γps1xp,2γth2,γs1p2xp,1γth1,γs1p2xp,2γth2)>1))⏟I4 |
where
I3=1−Pr(min(γpp2xp,1γth1,γpp2xp,2γth2)>1)=1−Pr(γpp2xp,1>γth1,γpp2xp,2>γth2)=1−Pr(|ˆhpp2|2>M11,|ˆhpp2|2>M12)=1−Pr(|ˆhpp2|2>M13)=1−e−M13λpp2 |
and
I4=1−Pr(min(γps1xp,1γth1,γps1xp,2γth2,γs1p2xp,1γth1,γs1p2xp,2γth2)>1)=1−Pr(γps1xp,1>γth1,γps1xp,2>γth2,γs1p2xp,1>γth1,γs1p2xp,2>γth2)=1−e−M4λps1Pr(|ˆhs1p2|2>M14,|ˆhs1p2|2>M15)=1−e−M4λps1Pr(|ˆhs1p2|2>M16)=1−e−M4λps1−M16λs1p2 |
The proof starts by substituting equation (11) into (23), the OP for SR can be written as
PSRout=1−Pr(γss1xs>γths)=1−Pr(|ˆhss1|2>M23)=1−e−M23λss1 |
Based on the definition of expectation, equation (28) can be further calculated as
RPR1=E[12log2(1+W)]=12ln2∫+∞01−FW(w)1+wdw |
It is assumed that
\begin{split} {F_W}\left( w \right) &= P_r\left( {W < w} \right) = P_r\left( {\min \left( {{u_1},{u_2},{u_3}} \right) < w} \right) \\ &= 1 - P_r\left( {\min \left( {{u_1},{u_2},{u_3}} \right) > w} \right) \\ &= 1 - P_r\left( {{u_1} > w,{u_2} > w,{u_3} > w} \right)\\ &= 1 - {{\rm{e}}^{ - {M_{25}} - {M_{26}} - {M_{27}}}} \end{split}\tag{D-2} |
We can figure out the ER of PR1 by plugging (D-2) into (D-1),
\begin{split} {R_{P{R_1}}} &= \frac{1}{{2\ln 2}}\int_0^{ + \infty } {\frac{{1 - {F_W}(w)}}{{1 + w}}} {\rm{d}}w \\ &= \frac{1}{{2\ln 2}}\int_0^{ + \infty } {\frac{1}{{1 + w}}} {{\rm{e}}^{ - {M_{25}} - {M_{26}} - {M_{27}}}}{\rm{d}}w \;\;\;\;\;\; \end{split} \tag{D-3} |
It is difficult to acquire an accurate closed-formed solution. Alternatively, we obtain the approximation with the aid of Gaussian-Chebyshev quadrature as [51]
\begin{split} {R_{P{R_1}}} &= \frac{1}{{2\ln 2}}\int_0^{ + \infty } {\frac{1}{{1 + w}}} {{\rm{e}}^{ - {M_{25}} - {M_{26}} - {M_{27}}}}{\rm{d}}w \\ &\approx \frac{1}{{2\ln 2}}\int_0^N {\frac{1}{{1 + w}}{{\rm{e}}^{ - {M_{25}} - {M_{26}} - {M_{27}}}}{\rm{d}}w} \\ &= \frac{1}{{2\ln 2}}\frac{{\pi N}}{{2k}}\sum\limits_{i = 0}^k {\frac{{2\sqrt {1 - {\phi _i}^2} }}{{2 + N({\phi _i} + 1)}}{{\rm{e}}^{ - {M_{28}} - {M_{29}} - {M_{30}}}}} \;\;\;\;\;\;\;\;\; \end{split} \tag{D-4} |
It is assumed that
\begin{split} {F_Z}(z)& = P_r\left( {Z < z} \right) = P_r\left( {\min \left( {{v_1},{v_2},{v_3}} \right) < z} \right) \\ &= 1 - P_r\left( {{v_1} > z,{v_2} > z,{v_3} > z} \right) \\ &= 1 - {{\rm{e}}^{ - {M_{34}} - {M_{35}} - {M_{36}}}} \end{split} \tag{E-1} |
The ER of PR2 can be written as
\begin{split} {R_{P{R_2}}} &= \frac{1}{{2\ln 2}}\int_0^{ + \infty } {\frac{{1 - {F_Z}(z)}}{{1 + z}}{\rm{d}}z} \\ &= \frac{1}{{2\ln 2}}\int_0^{ + \infty } {\frac{1}{{1 + z}}} {{\rm{e}}^{ - {M_{34}} - {M_{35}} - {M_{36}}}}{\rm{d}}z \end{split} \tag{E-2} |
Since exact closed-formed expressions are not available, considering that when
\begin{split} {R_{P{R_2}}} &= \frac{1}{{2\ln 2}}\int_0^{ + \infty } {\frac{1}{{1 + z}}} {{\rm{e}}^{ - {M_{34}} - {M_{35}} - {M_{36}}}}{\rm{d}}z\\ &\approx \frac{1}{{2\ln 2}}\int_0^{{N_2}} {\frac{1}{{1 + z}}} {{\rm{e}}^{ - {M_{34}} - {M_{35}} - {M_{36}}}}{\rm{d}}z \\ &= \frac{1}{{2\ln 2}}\frac{{\pi {N_2}}}{{2{k_2}}}\sum\limits_{i = 0}^{{k_2}} {\frac{{2\sqrt {1 - {\phi _i}^2} }}{{2 + {N_2}({\phi _i} + 1)}}} {{\rm{e}}^{ - {M_{37}} - {M_{38}} - {M_{39}}}} \\ \end{split} \tag{E-3} |
Letting
\begin{split} {F_\theta }(\theta ) & = P_r\left( {\frac{{{{\left| {{{\hat h}_{s{s_1}}}} \right|}^2}{\rho _s}}}{{\sigma _{{e_{s{s_1}}}}^2{\rho _{_s}} + 1}} < \theta } \right) \\ & = P_r\left( {{{\left| {{{\hat h}_{s{s_1}}}} \right|}^2} < \frac{{\theta (\sigma _{{e_{s{s_1}}}}^2{\rho _{_s}} + 1)}}{{{\rho _s}}}} \right) \\ &= {{\rm{e}}^{ - \frac{{\theta (\sigma _{{e_{s{s_1}}}}^2{\rho _s} + 1)}}{{{\lambda _{s{s_1}}}{\rho _{_s}}}}}} \end{split} \tag{F-1} |
By inserting (F-1) into (37), equation (38) can be acquired.
\begin{split} {R_{S}} & = E\left[{ {1 \over 2}}{\log _2}(1 + \gamma _{{x_s}}^{s{s_1}})\right] \\ &= \frac{1}{{2\ln 2}}\int_0^\infty {\frac{{1 - {F_\theta }(\theta )}}{{1 + \theta }}{\rm{d}}\theta } \\ &= \frac{1}{{2\ln 2}}\int_0^\infty {\frac{1}{{1 + \theta }}{{\rm{e}}^{ - \frac{{\theta (\sigma _{{e_{s{s_1}}}}^2{\rho _s} + 1)}}{{{\lambda _{s{s_1}}}{\rho _{_s}}}}}}{\rm{d}}\theta } \\ &= - \frac{1}{{2\ln 2}}{{\rm{e}}^{ - \frac{{(\sigma _{{e_{s{s_1}}}}^2{\rho _s} + 1)}}{{{\lambda _{s{s_1}}}{\rho _{_s}}}}}}E_i\left( { - \frac{{(\sigma _{{e_{s{s_1}}}}^2{\rho _s} + 1)}}{{{\lambda _{s{s_1}}}{\rho _{_s}}}}} \right) \;\;\; \;\;\; \end{split} \tag{F-2} |
[1] |
J. H. Zhao, X. K. Sun, Q. P. Li, et al., “Edge caching and computation management for real-time internet of vehicles: an online and distributed approach,” IEEE Transactions on Intelligent Transportation Systems, vol.22, no.4, pp.2183–2197, 2021. DOI: 10.1109/TITS.2020.3012966
|
[2] |
H. H. Yang, J. C. Shang , J. J. Li, et al., “Multi-traffic targets tracking based on an improved structural sparse representation with spatial-temporal constraint,” Chinese Journal of Electronics, vol.31, no.2, pp.266–276, 2022. DOI: 10.1049/cje.2020.00.007
|
[3] |
Y. K. Zheng, X. W. Li, H. Zhang, et al., “Overlay cognitive ABCom-NOMA-Based ITS: an in-depth secrecy analysis,” IEEE Transactions on Intelligent Transportation Systems, vol.24, no.2, pp.2217–2228, 2023. DOI: 10.1109/TITS.2022.3140325
|
[4] |
M. Y. Wang, Y. Lin, Q. Tian, et al., “Transfer learning promotes 6G wireless communications: recent advances and future challenges,” IEEE Transactions on Reliability, vol.70, no.2, pp.790–807, 2021. DOI: 10.1109/TR.2021.3062045
|
[5] |
G. Y. Liu, Y. H. Huang, N. Li, et al., “Vision, requirements and network architecture of 6G mobile network beyond 2030,” China Communications, vol.17, no.9, pp.92–104, 2020. DOI: 10.23919/JCC.2020.09.008
|
[6] |
M. Chen and Y. Q. Yang, “Iterative interference cancellation for non-orthogonal multiple access system,” Chinese Journal of Electronics, vol.29, no.3, pp.540–546, 2020. DOI: 10.1049/cje.2020.03.009
|
[7] |
Z. G. Ding, P. Z. Fan, G. K. Karagiannidis, et al., “NOMA assisted wireless caching: strategies and performance analysis,” IEEE Transactions on Communications, vol.66, no.10, pp.4854–4876, 2018. DOI: 10.1109/TCOMM.2018.2841929
|
[8] |
Z. Y. Xu, Z. G. Sun , L. L. Guo, et al., “Joint spectrum sensing and spectrum access for defending massive SSDF attacks: A novel defense framework,” Chinese Journal of Electronics, vol.31, no.2, pp.240–254, 2022. DOI: 10.1049/cje.2021.00.090
|
[9] |
Y. Z. Tan and B. R. Chen, “Joint channel estimation and power allocation for the CRS-NOMA,” Chinese Journal of Electronics, vol.29, no.1, pp.177–182, 2020.
|
[10] |
S. Arzykulov, T. A. Tsiftsis, G. Nauryzbayev, et al., “Outage performance of cooperative underlay CR-NOMA with imperfect CSI,” IEEE Communications Letters, vol.23, no.1, pp.176–179, 2019. DOI: 10.1109/LCOMM.2018.2878730
|
[11] |
L. Bai, L. N. Zhu, Q. Yu, et al., “Transmit power minimization for vector-perturbation based NOMA Systems: a sub-optimal beamforming approach,” IEEE Transactions on Wireless Communications, vol.18, no.5, pp.2679–2692, 2019. DOI: 10.1109/TWC.2019.2906909
|
[12] |
M. S. Van Nguyen, D. T. Do, S. Al-Rubaye, et al., “Exploiting impacts of antenna selection and energy harvesting for massive network connectivity,” IEEE Transactions on Communications, vol.69, no.11, pp.7587–7602, 2021. DOI: 10.1109/TCOMM.2021.3106099
|
[13] |
Z. Yang, Z. G. Ding, P. Z. Fan, et al., “On the performance of non-orthogonal multiple access systems with partial channel information,” IEEE Transactions on Communications, vol.64, no.2, pp.654–667, 2016. DOI: 10.1109/TCOMM.2015.2511078
|
[14] |
H. C. Lu, X. D. Jiang, and C. W. Chen, “Distortion-aware cross-layer power allocation for video transmission over multi-user NOMA systems,” IEEE Transactions on Wireless Communications, vol.20, no.2, pp.1076–1092, 2021. DOI: 10.1109/TWC.2020.3030785
|
[15] |
D. T. Do, A. T. Le, Y. W. Liu, et al., “User grouping and energy harvesting in UAV-NOMA system with AF/DF relaying,” IEEE Transactions on Vehicular Technology, vol.70, no.11, pp.11855–11868, 2021. DOI: 10.1109/TVT.2021.3116101
|
[16] |
G. Li, H. L. Liu, G. J. Huang, et al., “Effective capacity analysis of reconfigurable intelligent surfaces aided NOMA network,” EURASIP Journal on Wireless Communications and Networking, vol.2021, no.1, article no.198, 2021. DOI: 10.1186/s13638-021-02070-7
|
[17] |
W. J. Xu, X. Li, C. H. Lee, et al., “Joint sensing duration adaptation, user matching, and power allocation for cognitive OFDM-NOMA Systems,” IEEE Transactions on Wireless Communications, vol.17, no.2, pp.1269–1282, 2018. DOI: 10.1109/TWC.2017.2777476
|
[18] |
Z. Shi, C. M. Zhang, Y. R. Fu, et al., “Achievable diversity order of HARQ-Aided downlink NOMA systems,” IEEE Transactions on Vehicular Technology, vol.69, no.1, pp.471–487, 2020. DOI: 10.1109/TVT.2019.2950067
|
[19] |
F. Lin, Z. Hu, S. J. Hou, et al., “Cognitive radio network as wireless sensor network (II): security consideration,” in Proceedings of 2011 IEEE National Aerospace and Electronics Conference, Dayton, OH, USA, pp.324–328, 2011.
|
[20] |
H. Li, W. J. Zhao, C. Liu, et al., “A novel goodness of fit test spectrum sensing using extreme eigenvalues,” Chinese Journal of Electronics, vol.29, no.6, pp.1201–1206, 2020. DOI: 10.1049/cje.2020.10.007
|
[21] |
S. Singh and M. Bansal,, “On the outage performance of overlay cognitive STBC-NOMA system with imperfect SIC,” IEEE Wireless Communications Letters, vol.10, no.11, pp.2587–2591, 2021. DOI: 10.1109/LWC.2021.3109444
|
[22] |
P. Das and N. B. Mehta, “Direct link-aware optimal relay selection and a low feedback variant for underlay CR,” IEEE Transactions on Communications, vol.63, no.6, pp.2044–2055, 2015. DOI: 10.1109/TCOMM.2015.2432026
|
[23] |
X. W. Li, Y. K. Zheng, M. D. Alshehri, et al., “Cognitive AmBC-NOMA IoV-MTS networks with IQI: reliability and security analysis,” IEEE Transactions on Intelligent Transportation Systems, vol.24, no.2, pp.2596–2607, 2023. DOI: 10.1109/TITS.2021.3113995
|
[24] |
M. C. Filippou, D. Gesbert, and G. A. Ropokis, “A comparative performance analysis of interweave and underlay multi-antenna cognitive radio networks,” IEEE Transactions on Wireless Communications, vol.14, no.5, pp.2911–2925, 2015. DOI: 10.1109/TWC.2015.2396519
|
[25] |
S. H. Wang, C. Y. Hsu, and Y. W. P. Hong, “Distributed exploitation of spectrum and channel state information for channel reservation and selection in interweave cognitive radio networks,” IEEE Transactions on Wireless Communications, vol.12, no.7, pp.3458–3472, 2013. DOI: 10.1109/TWC.2013.060313.121676
|
[26] |
C. Lameiro, I. Santamaría, P. J. Schreier, et al., “Maximally improper signaling in underlay MIMO cognitive radio networks,” IEEE Transactions on Signal Processing, vol.67, no.24, pp.6241–6255, 2019. DOI: 10.1109/TSP.2019.2953665
|
[27] |
A. Alizadeh, H. R. Bahrami, and M. Maleki, “Performance analysis of spatial modulation in overlay cognitive radio communications,” IEEE Transactions on Communications, vol.64, no.8, pp.3220–3232, 2016. DOI: 10.1109/TCOMM.2016.2581817
|
[28] |
S. Kashyap and N. B. Mehta, “SEP-optimal transmit power policy for peak power and interference outage probability constrained underlay cognitive radios,” IEEE Transactions on Wireless Communications, vol.12, no.12, pp.6371–6381, 2013. DOI: 10.1109/TWC.2013.111013.130615
|
[29] |
J. H. Zhao, S. J. Ni, L. H. Yang, et al., “Multiband cooperation for 5G HetNets: a promising network paradigm,” IEEE Vehicular Technology Magazine, vol.14, no.4, pp.85–93, 2019. DOI: 10.1109/MVT.2019.2935793
|
[30] |
Y. W. Liu, Z. G. Ding, M. Elkashlan, et al., “Nonorthogonal multiple access in large-scale underlay cognitive radio networks,” IEEE Transactions on Vehicular Technology, vol.65, no.12, pp.10152–10157, 2016. DOI: 10.1109/TVT.2016.2524694
|
[31] |
L. W. Wei, T. Jing, X. Fan, et al., “The secrecy analysis over physical layer in NOMA-enabled cognitive radio networks,” in Proceedings of 2018 IEEE International Conference on Communications, Kansas City, MO, USA, pp.1–6, 2018.
|
[32] |
L. Bariah, S. Muhaidat, and A. Al-Dweik, “Error performance of NOMA-based cognitive radio networks with partial relay selection and interference power constraints,” IEEE Transactions on Communications, vol.68, no.2, pp.765–777, 2020. DOI: 10.1109/TCOMM.2019.2921360
|
[33] |
L. Lv, L. Yang, H. Jiang, et al., “When NOMA meets multiuser cognitive radio: opportunistic cooperation and user scheduling,” IEEE Transactions on Vehicular Technology, vol.67, no.7, pp.6679–6684, 2018. DOI: 10.1109/TVT.2018.2805638
|
[34] |
A. H. Bastami, “NOMA-based spectrum leasing in cognitive radio network: power optimization and performance analysis,” IEEE Transactions on Communications, vol.69, no.7, pp.4821–4831, 2021. DOI: 10.1109/TCOMM.2021.3069866
|
[35] |
H. F. Shuai, K. F. Guo, K. An, et al., “NOMA-based integrated satellite terrestrial networks with relay selection and imperfect SIC,” IEEE Access, vol.9, pp.111346–111357, 2021. DOI: 10.1109/ACCESS.2021.3103944
|
[36] |
X. M. Chen, R. D. Jia, and D. W. K. Ng, “On the design of massive non-orthogonal multiple access with imperfect successive interference cancellation,” IEEE Transactions on Communications, vol.67, no.3, pp.2539–2551, 2019. DOI: 10.1109/TCOMM.2018.2884476
|
[37] |
X. M. Chen and C. Yuen, “On interference alignment with imperfect CSI: characterizations of outage probability, Ergodic rate and SER,” IEEE Transactions on Vehicular Technology, vol.65, no.1, pp.47–58, 2016. DOI: 10.1109/TVT.2015.2397000
|
[38] |
T. H. Yang, R. Q. Zhang, X. Cheng, et al., “Secure massive MIMO under imperfect CSI: performance analysis and channel prediction,” IEEE Transactions on Information Forensics and Security, vol.14, no.6, pp.1610–1623, 2019. DOI: 10.1109/TIFS.2018.2883150
|
[39] |
W. U. Khan, X. W. Li, A. Ihsan, et al., “NOMA-enabled optimization framework for next-generation small-cell IoV networks under imperfect SIC decoding,” IEEE Transactions on Intelligent Transportation Systems, vol.23, no.11, pp.22442–22451, 2022. DOI: 10.1109/TITS.2021.3091402
|
[40] |
M. W. Akhtar, S. A. Hassan, S. Saleem, et al., “STBC-aided cooperative NOMA with timing offsets, imperfect successive interference cancellation, and imperfect channel state information,” IEEE Transactions on Vehicular Technology, vol.69, no.10, pp.11712–11727, 2020. DOI: 10.1109/TVT.2020.3017249
|
[41] |
Y. S. Sun, Z. G. Ding, and X. C. Dai, “On the outage performance of network NOMA (N-NOMA) modeled by Poisson line cox point process,” IEEE Transactions on Vehicular Technology, vol.70, no.8, pp.7936–7950, 2021. DOI: 10.1109/TVT.2021.3095350
|
[42] |
H. Xiao, H. Jiang, F. R. Shi, et al., “Energy-efficient resource allocation in radio-frequency-powered cognitive radio network for connected vehicles,” IEEE Transactions on Intelligent Transportation Systems, vol.22, no.8, pp.5426–5436, 2021. DOI: 10.1109/TITS.2020.3026746
|
[43] |
Z. Yang, J. A. Hussein, P. Xu, et al., “Performance study of cognitive relay NOMA networks with dynamic power transmission,” IEEE Transactions on Vehicular Technology, vol.70, no.3, pp.2882–2887, 2021. DOI: 10.1109/TVT.2021.3060127
|
[44] |
B. Li, X. H. Qi, K. Z. Huang, et al., “Security-reliability tradeoff analysis for cooperative NOMA in cognitive radio networks,” IEEE Transactions on Communications, vol.67, no.1, pp.83–96, 2019. DOI: 10.1109/TCOMM.2018.2873690
|
[45] |
L. P. Luo, Q. Z. Li, and J. L. Cheng, “Performance analysis of overlay cognitive NOMA systems with imperfect successive interference cancellation,” IEEE Transactions on Communications, vol.68, no.8, pp.4709–4722, 2020. DOI: 10.1109/TCOMM.2020.2992471.(查阅网上资料,本条与第18条文献重复,请确认)
|
[46] |
A. V. and B. A. V., “Performance analysis of NOMA-based underlay cognitive radio networks with partial relay selection,” IEEE Transactions on Vehicular Technology, vol.70, no.5, pp.4615–4630, 2021. DOI: 10.1109/TVT.2021.3071338
|
[47] |
D. T. Do, T. A. Le, T. N. Nguyen, et al., “Joint impacts of imperfect CSI and imperfect SIC in cognitive radio-assisted NOMA-V2X communications,” IEEE Access, vol.8, pp.128629–128645, 2020. DOI: 10.1109/ACCESS.2020.3008788
|
[48] |
D. T. Do, M. S. van Nguyen, M. Voznak, et al., “Performance analysis of clustering car-following V2X system with wireless power transfer and massive connections,” IEEE Internet of Things Journal, vol.9, no.16, pp.14610–14628, 2022. DOI: 10.1109/JIOT.2021.3070744
|
[49] |
X. W. Li, Q. S. Wang, M. Liu, et al., “Cooperative wireless-powered NOMA relaying for B5G IoT networks with hardware impairments and channel estimation errors,” IEEE Internet of Things Journal, vol.8, no.7, pp.5453–5467, 2021. DOI: 10.1109/JIOT.2020.3029754
|
[50] |
X. W. Li, J. J. Li, Y. W. Liu, et al., “Residual transceiver hardware impairments on cooperative NOMA networks,” IEEE Transactions on Wireless Communications, vol.19, no.1, pp.680–695, 2020. DOI: 10.1109/TWC.2019.2947670
|
[51] |
Q. Q. Zhang, L. Zhang, Y. C. Liang, et al., “Backscatter-NOMA: a symbiotic system of cellular and internet-of-things networks,” IEEE Access, vol.7, pp.20000–20013, 2019. DOI: 10.1109/ACCESS.2019.2897822
|
[1] | CHEN Min, YANG Yongqin. Iterative Interference Cancellation for Non-orthogonal Multiple Access System[J]. Chinese Journal of Electronics, 2020, 29(3): 540-546. DOI: 10.1049/cje.2020.03.009 |
[2] | LIU Jingsen, LIU Li, LI Yu. A Differential Evolution Flower Pollination Algorithm with Dynamic Switch Probability[J]. Chinese Journal of Electronics, 2019, 28(4): 737-747. DOI: 10.1049/cje.2019.04.008 |
[3] | TANG Kun, SHI Ronghua, GUO Yabo, SHI Heyuan, DONG Jian. An Adaptive Transmission Scheme in Cooperative Relay Networks with Energy Accumulation[J]. Chinese Journal of Electronics, 2019, 28(1): 152-161. DOI: 10.1049/cje.2018.08.002 |
[4] | PAN Ziyu, ZHU Qi, LIANG Guangjun, HU Han. Coverage Probability and Average Rate of Uplink Cellular Networks Based on a 3-D Model[J]. Chinese Journal of Electronics, 2018, 27(5): 1098-1103. DOI: 10.1049/cje.2018.06.017 |
[5] | LIU Shuai, SUN Dechun, LIU Zujun, YI Kechu, YANG Hong, WANG Kan. Outage Performance of Cognitive AF Relay Networks with Imperfect CSI Based on Geometrical Analysis[J]. Chinese Journal of Electronics, 2017, 26(5): 1048-1056. DOI: 10.1049/cje.2017.04.008 |
[6] | ZHANG Jun, TIAN Hui. An Isotropic SPPP Model for Femtocells Networks with Outage Probability Constraints[J]. Chinese Journal of Electronics, 2015, 24(4): 824-831. DOI: 10.1049/cje.2015.10.027 |
[7] | LIANG Hui, ZHAO Xiaohui. Primary User QoS and Activity Concerned Resource Allocation Algorithm in OFDM Based Cognitive Radio System[J]. Chinese Journal of Electronics, 2013, 22(1): 167-172. |
[8] | LI Weihua and JIAO Bingli. On the Outage Capacity of MIMO Systems withPeriodic Feedback[J]. Chinese Journal of Electronics, 2010, 19(2): 333-338. |
[9] | WU Zhuang, YANG Yang, GUO Xun, AN Jianwei. Analysis of Collision Probability in IEEE 802.11Based VANETs[J]. Chinese Journal of Electronics, 2010, 19(1): 187-190. |
[10] | ZOU Yulong, ZHENG Baoyu, ZHOU Liang. An Opportunistic Cooperation Scheme in Wireless Networks: When to Cooperate with the Relay?[J]. Chinese Journal of Electronics, 2009, 18(2): 361-367. |
1. | Chen, X., Shi, J., Zhu, J. et al. General Low-complexity Beamforming Designs for Reconfigurable Intelligent Surface-aided Multi-user Systems | [智能超表面辅助多用户系统的通用低复杂度波束成形设计]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2025, 47(1): 128-137. DOI:10.11999/JEIT240051 | |
2. | Zhu, Z., Yang, C., Li, Z. et al. Resource Allocation Algorithm for Intelligent Reflecting Surface-assisted Secure Integrated Sensing And Communications System | [智能反射面辅助通感一体化系统安全资源分配算法]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2025, 47(1): 66-74. DOI:10.11999/JEIT240083 | |
3. | Ren, Q., Lin, S., Cai, Y. et al. Resource Allocation and Slicing Strategy for Multiple Services Co-Existence in Wireless Train Communication Network. IEEE Transactions on Wireless Communications, 2025, 24(1): 401-414. DOI:10.1109/TWC.2024.3493240 | |
4. | Sheng, X.. Effective capacity of STAR-RIS assisted RSMA network with imperfect SIC. Physical Communication, 2024. DOI:10.1016/j.phycom.2024.102449 | |
5. | Herich, D., Vaščák, J. The Evolution of Intelligent Transportation Systems: Analyzing the Differences and Similarities between IoV and IoFV. Drones, 2024, 8(2): 34. DOI:10.3390/drones8020034 | |
6. | Peng, H., Liu, M., Yang, L. et al. Ambient Backscatter Communication Symbiotic Intelligent Transportation Systems: Covertness Performance Analysis and Optimization. IEEE Transactions on Consumer Electronics, 2024, 70(1): 1833-1844. DOI:10.1109/TCE.2023.3329675 | |
7. | Ananth Kumar, M.S.. Bio-inspired Hybrid Lyrebird Optimization based Power Allocation and Relay-Selection Scheme. Proceedings of SPIE - The International Society for Optical Engineering, 2024. DOI:10.1117/12.3030079 | |
8. | Zhou, Y., Deng, F., Li, S. Jointly Active/Passive Beamforming Optimization for Intelligent-Reflecting Surface-Assisted Cognitive-IoT Networks. Electronics (Switzerland), 2024, 13(2): 299. DOI:10.3390/electronics13020299 | |
9. | Li, X., Zhang, J., Han, C. et al. Reliability and Security of CR-STAR-RIS-NOMA-Assisted IoT Networks. IEEE Internet of Things Journal, 2024, 11(17): 27969-27980. DOI:10.1109/JIOT.2023.3340371 | |
10. | Menaa, S., Khelil, A., Rabie, K.M. et al. On the ergodic capacity of MIMO-NOMA systems with JTRAS protocol under imperfect SIC and CSI. International Journal of Electronics, 2024, 111(10): 1760-1779. DOI:10.1080/00207217.2023.2240077 | |
11. | Li, J., Ma, X., Ye, F. et al. Physical layer security of single-input multiple-out relay networks over Beaulieu-Xie fading channels. IET Communications, 2023, 17(16): 1928-1939. DOI:10.1049/cmu2.12663 | |
12. | Li, X., Gao, X., Shaikh, S.A. et al. NOMA-based cognitive radio network with hybrid FD/HD relay in industry 5.0. Journal of King Saud University - Computer and Information Sciences, 2023, 35(6): 101363. DOI:10.1016/j.jksuci.2022.08.013 | |
13. | Kumar, M., Dohare, U., Kumar, S. et al. Blockchain Based Optimized Energy Trading for E-Mobility Using Quantum Reinforcement Learning. IEEE Transactions on Vehicular Technology, 2023, 72(4): 5167-5180. DOI:10.1109/TVT.2022.3225524 | |
14. | Bachan, P., Agarwal, D. Outage and Throughput Performance of NOMA Inspired Cognitive IoT Network with Imperfect SIC. 2023. DOI:10.1109/CISCT57197.2023.10351319 | |
15. | Li, Y., Huang, H., Zhang, N. et al. Non-Orthogonal Multiple Access Techniques for Future Wireless Networks: Challenges, Applications and Emerging Directions. 2023. DOI:10.1109/Ucom59132.2023.10257635 | |
16. | Islam, S., Budati, A.K., Hasan, M.K. et al. Sustainable Non-Cooperative User Detection Techniques in 5G Communications for Smart City Users. Sustainability (Switzerland), 2023, 15(1): 118. DOI:10.3390/su15010118 | |
17. | Zhang, G., Chen, K., Ma, C. et al. Decision fusion for multi-route and multi-hop Wireless Sensor Networks over the Binary Symmetric Channel. Computer Communications, 2022. DOI:10.1016/j.comcom.2022.09.025 | |
18. | Zhang, Y., He, W., Li, X. et al. Covert Communication in Downlink NOMA Systems With Channel Uncertainty. IEEE Sensors Journal, 2022, 22(19): 19101-19112. DOI:10.1109/JSEN.2022.3201319 |
Channel estimation error | \sigma _{ {e_{p{p_1} } } }^2 = \sigma _{ {e_{p{p_2} } } }^2 = \sigma _{ {e_{p{s_1} } } }^2 = \sigma _{ {e_{s{s_1} } } }^2 = \sigma _{ {e_{ {s_1}{p_1} } } }^2 = \sigma _{ {e_{ {s_1}{p_2} } } }^2 = 0.01 |
Estimated channel coefficient | \{ {\lambda _{p{p_1}}},{\lambda _{p{p_2}}},{\lambda _{p{s_1}}},{\lambda _{s{s_1}}},{\lambda _{{s_1}{p_1}}},{\lambda _{{s_1}{p_2}}}\} {\rm{ = \{ 0}}{\rm{.1,0.5,2,0.1,4,3\} }} |
Power allocation coefficient | {\alpha _1} = {\alpha _3} = 0.9 , {\alpha _2} = {\alpha _4} = 0.1 |
Noise power | N_n = 1 |
Imperfect SIC | \{ {\zeta _1},{\zeta _2},{\zeta _3}\} = 0.001 |
Targeted date rate | \{ {\gamma _{{\rm{th}}1 } },{\gamma _{{\rm{th}}2 } },{\gamma _{{\rm{th}}s } }\} = \{ 1,1,2\} |