Next Article in Journal
Establishment of the Complete Closed Mesh Model of Rail-Surface Scratch Data for Online Repair
Previous Article in Journal
Metrological Challenges in Collaborative Sensing: Applicability of Digital Calibration Certificates
Previous Article in Special Issue
Beamforming Optimization in Internet of Things Applications Using Robust Swarm Algorithm in Conjunction with Connectable and Collaborative Sensors
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On Outage Probability and Ergodic Rate of Downlink Multi-User Relay Systems with Combination of NOMA, SWIPT, and Beamforming

1
Faculty of Radio-Electronic Engineering, Le Quy Don Technical University, 236 Hoang Quoc Viet, Hanoi 100000, Vietnam
2
Faculty of Electronics and Telecommunications, Electric Power University, 238 Hoang Quoc Viet, Hanoi 100000, Vietnam
3
Faculty of Profesional Telecommunications, Nha trang University of Telecommunication, 101 Mai Xuan Thuong, Nha Trang 650000, Vietnam
*
Author to whom correspondence should be addressed.
Submission received: 8 July 2020 / Revised: 12 August 2020 / Accepted: 16 August 2020 / Published: 21 August 2020
(This article belongs to the Special Issue Internet of Things Based Multimedia Sensor Networks)

Abstract

:
A downlink of multi-user non-orthogonal multiple access (NOMA) relay systems is considered. To improve system performance, relay nodes are used to forward signals from the base station (BS) to the end users, and they are wirelessly powered by energy harvesting from the radio frequency transmitted from the BS. Moreover, beamforming is applied at the BS based on multiple antennas and relay nodes consist of one transmit antenna but several receive ones. The system performance is demonstrated through closed-form expressions of outage probability (OP) and ergodic rate (ER) over Rayleigh fading channels. The proposed system is investigated in two cases of perfect and imperfect successive interference cancellation (SIC), and the imperfect channel state information condition is also taken into consideration. The OP and ER are calculated in many scenarios and the optimal time fraction of energy harvesting corresponding to the minimum OP is discussed. The exact and approximate theoretical results are compared with the simulation result to confirm the proposed theoretical analysis method.

1. Introduction

The Internet of Things (IoT) has received an increasing attention from both industry and academia for recent years [1,2,3]. It is considered to be a crucial means for wireless connections in the era of the fourth industry. The IoT was also included in the advanced wireless standards such as the fourth generation (4G) and has been considering for the fifth generation (5G) of mobile communications [4,5]. Most IoT devices are battery operated or can be located in the deep ocean, outback, and military devices, therefore, battery recharging methods can be economically infeasible or unredeemable. As a result, the IoT system needs to be improved its performance such as lifetime, capacity, spectral and energy efficiencies to meet with requirements of future communication systems.
To support a large multi-user system such as the IoT, the non-orthogonal multiple access (NOMA) is significantly considered due to its high bandwidth efficiency [6,7,8]. These works investigated the performance of the multi-user NOMA system and solved problems through simulation. The coexistence of both OMA and NOMA methods for communication capability on a communication device in wireless networks is proposed in [9], i.e., according to requirement of Quality of Service (QoS), users decide to use OMA or NOMA method for information transmission. This scheme would be risky because of inaccurate recognition of QoS. On the other hand, the problems of mode selection, dynamic user association, and power optimization have been studied for in-band full duplex (IBFD) and NOMA operating networks [10].
There has been a research that takes multi-beam multiple input single output (MISO) NOMA into consideration [11]. However, the author assumed that each cluster has only two users named as the near user and far user. We are going to extend this work with more users in the same beam.
A combination of the NOMA and energy harvesting (EH) was considered in some papers [12,13,14,15,16]. In these papers, the authors proposed the simultaneous wireless information and power transfer (SWIPT) for the NOMA network in which the near user works as the EH relay to assist the far user for improving both network lifetime and spectral efficiency.
Moreover, there have been several papers researching on a combination of the radio frequency (RF) EH and relay communication to enhance the system performance [17,18,19,20,21]. For example, in [17], the dual-hop decode-and-forward (DF) relaying network employing a time switching-based relaying mechanism was analyzed and the proposed system was evaluated via the outage probability. In [18], the authors concentrated on the amplify-and-forward (AF) relaying system and investigated the fixed-gain and variable-gain relaying schemes to deal with interference. In [19], the multiple input multiple output (MIMO) full-duplex system was considered and the optimal throughput was analyzed. Since antennas are configured at relay nodes, the energy consumption of relay nodes depends on the number of antennas.
The small cell station can harvest energy transmitted by a macro-cell base station or by solar panels [22]. This work is close to our proposed system; however, it only investigated EH for the small cell station of a two-tier heterogeneous small cell network, and the authors did not take the NOMA aspect into consideration. On the other hand, to harvest energy from RF signal or solar panels, the base station uses different architectures, it is hard to combine in one device. The problem of EH efficiency from RF is shown in [23], in this work, the authors proposed a low complexity energy transfer and transmission adaptation algorithm in order to determine the optimal power station’s transmission power. However, this work considered an orthogonal frequency multiple access scheme.
A combining SWIPT-NOMA downlink relaying protocol is a potential approach to achieve high energy efficiency and performance, i.e., prolonging the lifetime and improving the throughput of wireless networks, especially for designing the future 5G and 6G networks. To the best of our knowledge, there is a lack of studies on a combination of the SWIPT and NOMA in relaying network systems.
Due to a big gap between the active sensitivity of energy harvester and that of decoder (i.e., −10 dBm for EH and −60 dBm for information receiving), the SWIPT-based network is only appropriate for short-distance transmission. To overcome this limitation, the authors of [24,25,26] proposed the systems in which individual EH and information receivers are used depending on the time switching (TS) and power slitting (PS) to supply power for wireless devices. In particular, [27] proposed three wireless power transfer policies. Namely, the cooperative power beacons (PBs) power transfer, the best PBs power transfer, and the nearest PBs power transfer. Since the SWIPT with PBs is fully controllable, it can provide various applications with high quality of service (QoS) requirements. The RF EH from PBs was proposed and investigated in [28,29]. However, [28,29], and also other previous works [25,26] only considered point-to-point communication systems and frequencies used to transmit PBs and information during EH period are different. In these papers, the PBs are transmitted continuously; however, this approach is not an optimal solution in the sense of saving the PBs power and requires a high practical cost as well.
It is clear that an application of the EH from the surrounding RF to supply power for wireless devices is an avocational research for the next generation networks, 5G and 6G. In our initial works [30,31], we have investigated the NOMA beamforming relay system and then concentrated on a combination of the SWIPT, NOMA and beamforming technique for the downlink of the multi-user system at the beginning step.
The contributions of this paper are summarized as follows
  • We propose a downlink MIMO-NOMA with SWIPT relay system which aims to improve the energy and spectrum efficiencies of the system. To reduce the complexity and mitigate inter-user interference, users in the system are divided into several clusters and a suitable user clustering mode is found out. The relays are employed to mitigate the effect of fading and reduce the number of training sequences for estimating the CSI at the base station.
  • We derive the closed-form expressions of the outage probability (OP) and ergodic rate (ER) for each user in any cluster. For the practical purpose, we investigate the proposed MIMO-NOMA with SWIPT relay system over Rayleigh channel. The time duration of EH is optimized in the sense of minimum OP. The analysis result provides insights to understand the performance of the MIMO-NOMA system with SWIPT through the mathematical expressions.
  • We consider the system in the case of imperfect channel state information (CSI) caused by the downlink channel estimation error and both cases of perfect and imperfect successive interference cancellation (SIC). The result shows that the system performance is reduced significantly due to the imperfect CSI and imperfect SIC. All analysis results are compared with simulation results to confirm the correctness of the derived mathematical expressions.
The rest of the paper is organized as follows. Section 2 represents the proposed system model, illustrating CSI requirement, channel model, and energy harvesting technique. Section 3 concentrates on performance analysis, deriving the closed-form expressions of the OP and ER. Section 4 demonstrates numerical results and discussion. Finally, Section 5 concludes the paper.
For the convenience, in the following Table 1, we provide notations along with their descriptions used in this paper.

2. System Model

In this paper, a downlink of the multi-user (MUs) relaying communication network is investigated. In this system, the BS communicates with users via a support of relay (R) nodes as illustrated in Figure 1. There are M relay nodes that are deployed in the cell and have constrained energy. To improve the energy efficiency, the relay node harvests energy from surrounding RF. The BS node and each relay node have N t and N r antennas, respectively, satisfying the following condition ( N t ( M 1 ) ) . While users have a single antenna because of the limited size, the BS can be considered to be having massive antennas. The block diagram of the first hop from the BS node to the relay node is shown in Figure 2, in which the signal, which is transmitted to all users in the mth cluster, is denoted as x S , m . The signal x S , m is multiplied by N t × 1 beamforming vector w m before being transmitted over channel, and the beamforming vector w m is assumed to be normalized w m 2 = 1 .
Users that are close to a relay node, are grouped into a cluster with the help of the GPS algorithm (The spatial direction of users can be found via various methods/technologies such as GPS or user location tracking algorithms.). We assume that there are N users in every cluster and the NOMA scheme is applied to improve the spectrum efficiency, i.e., signals are superposed in the power domain at the BS. Moreover, the NOMA techniques and DF protocol are performed at the relay node and users to remove the inter-user interference. In the next section, the proposed multi-relay NOMA scheme is described in detail.
The operation of the MIMO-NOMA system with SWIPT and beamforming in DF protocol can be summarized as follows. A complete signal transmission procedure from the BS to the D n under assistance of SWIPT relays in the proposed MIMO-NOMA system takes three time slots. In the first time slot, the relay harvests energy from broadcasts of BS over downlink channel. The duration time of this slot is denoted by α T . In the second time slot, the BS sends the signal to relays after performing superposition coding based on the characteristic of each user. In the third time slot, R m re-encodes the received signals and then assigns the power for these signals before forwarding them to the users.

2.1. CSI Condition and Channel Model

For transmitting beamforming, the BS requires the CSI. In the proposed model, the BS receives the CSI by up-link channel estimation. Herein, at the beginning of a working section, relay nodes send pilot symbols to the BS. Since the BS and relay node are imperfectly synchronized, all pilot signals transmitted from the relay node to the BS are non-orthogonal and imperfect. As a result, the perfect CSI obtained at the BS is absolutely challenging owing to both causes as channel estimation error and feedback delay. Assuming that the minimum mean squared error (MMSE) estimation is used, the difference between the estimated channel matrix h ^ m and the actual channel matrix h m can be illustrated as the following equation [33]
h m = h ^ m + e ,
here e denotes the channel estimation error vector with independent and identically distributed (i.i.d.) zero mean and unit variance complex Gaussian distributed entries.
To allocate power for users, the relay node also require CSI. The difference between the estimated channel coefficient g ^ n and actual channel coefficient g n can be also demonstrated as
g n = g ^ n + e ,
here e denotes an error of the channel coefficient estimation between the R m and the D n .
In addition, Ω ^ A = Ω A σ ε A 2 with A { SR m , RD n } is the channel gain norm of the h ^ m . Let 0 ρ A 1 is the correlation between coefficients of channel estimation error and coefficients of the perfect channel. Let σ ε A 2 = ρ A Ω A and Ω ^ A = ( 1 ρ A ) Ω A denote the variance norm and the variable of channel estimation error, respectively.
In this paper, the zero-force beamforming (ZFBF) is employed at the BS to deal with a trade-off between the complexity of implementation and performance of the system. The weight w m for the mth cluster is designed to cancel the interference from the other clusters.
Every antenna of the BS sends the superposition code, which consists of N signals of the mth cluster and can be described by x m .
x m = n = 1 N a n P S x m , n ,
here a n illustrates the power allocation coefficient of the ( m , n ) th user with n = 1 N a n = 1 . At the output of antenna, this signal is built with the beam vector, w m , that depends on the ZFBF. As a result, the signal corresponding to the mth cluster is given by the following equation.
x S , m = w m x S , m = w m n = 1 N a n P S x m , n .
The N t × 1 signal vector x S = x S , 1 + + x S , M is transmitted to all relay nodes over a single cell. Hence, the received signal vector at the relay node can be calculated as
y R = h m x S + n m = h m w m n = 1 N a n P S x m , n m th   beam + h m k m x s , k other   beam + n m ,
where n m = [ n 1 , , n N ] C 1 × N with n m CN ( 0 , σ m 2 ) denotes the additive white Gaussian noise (AWGN) at the mth relay (The channel gain formulation, the interference model, the signaling overhead can be found in [34]).
According to the NOMA technique, the power domain is used for multiple access of the MUs at the same time and frequency, i.e., different power levels are allocated to different users. Consequently, w m can be considered to be a projection of h m in a null space of interfered channels according to the mth cluster. To maximize the channel gain and mitigate the inter-cluster interference, the w m can be defined as
w m = Π m h m Π m h m ,
here Π m = I N H m ( H m H H m ) 1 H m H , H m denotes an extended channel matrix that does not consist of h m and its construction is represented as
H m = [ h 1 , h 2 , , h m 1 , h m + 1 , , h M ] T .
The condition to transmit the signal from the BS to the mth relay node is that there is a dimension greater than zero in the null space of H m . As a result, we have
h m H w j = 0 , m j .
In other words, the condition in (8) is used to cancel completely interference during of the first hop of inter-relay. In addition, owning to the assistance the multiple relays, the size of matrix for designing beamforming is not so large and the computational complexity is bearable.
In this paper, a beam is assumed to be designed perfectly. Therefore, the output signal of the SIC structure at the mth relay node can be illustrated as
y R , S I C = h m w m n = 1 N a n P S x m , n + n m = h m w m a n P S x m , n desired   signal   of   ( m , n ) th   user + h m w m i = n + 1 N a i P S x m , i interference   of   other   users + h m w m k = 1 n 1 ξ 1 a k P S x m , k interference   of   imperfect   SIC + n m .
The term h m w m k = 1 n 1 ξ 1 a k P S x m , k is equal to zero if the SIC is perfect.

2.2. Energy Harvesting

In this work, the time switching (TS) is investigated owning to its higher performance and easier implementation than the power splitting when these two protocols are applied for the multi-user MIMO networks with the EH technique as demonstrated in [35]. The TS architecture [36] as in Figure 3 is supposed for the operation of the relay node (The proposed analysis approach can also be applied to the power spitting EH model [37]). In this figure, T is a block time to transmit a certain block of information from the source node to the destination node. The communication process is split into three time slots, the first slot, α T ( 0 α 1 ), for energy harvesting at the relay node, the second one, ( 1 α ) T / 2 , for the S-to-R information transmission and the third one, ( 1 α ) T / 2 , for the R-to-D information transmission. In case the relay node does not have an energy buffer to store the harvested energy, the harvest-use (HU) architecture [38] can be used.
Assuming that the EH process is only performed from the received signals in α T time interval of each period. As a result, the harvested energy can be calculated as ([36], Equation (2)).
E h = α T η P S | h m w m | 2 ,
where η , 0 < η < 1 , illustrates the energy conversion efficiency and depends on the harvester quality and P S denotes the transmission power of the source.
According to the HU architecture, the relay node uses total harvested energy in the harvesting phase to forward the received data to users. Hence, the transmission power of the relay node is given by
P R = 2 α η P S ( 1 α ) | h m w m | 2 = ϕ P S | h m w m | 2 ,
here ϕ = 2 α η / ( 1 α ) .
The large-scale fading coefficient of the ( m , n ) th user is denoted by d n β , where d n is the distance between the relay node and the ( m , n ) th user and β is the path loss factor. Moreover, g ˜ n represents the small-scale fading coefficient of the ( m , n ) th user, leading to the fact that g n = g ˜ n d n β and g n C N ( μ , Ω RD n ) , where Ω RD n = E { | g n | 2 } . The AWGN noise vector at the ( m , n ) th user is w D n C N ( 0 , N 0 ) with N 0 is the noise variance at the receiver. All channel gains have the i.i.d Rayleigh distribution. Without any loss of generality, we assume that d 1 > d 2 , , > d N . Hence, the channel gains are sorted according to the ascending order | g 1 | 2 < , , < | g N | 2 .
During the second time slot, the relay node re-encodes and forwards the messages to the user. Since the transmission power of the relay node, which depends on the quality of the energy harvester, is always smaller than that of the source. Therefore, it is necessary to re-allocate power to be fair performance of users. The output signal of the SIC architecture of the ( m , n ) th user is given as
y D n = g n b n P R x m , n desired   signal   of   ( m , n ) th   user + g n i = n + 1 N b i P R x m , i interference   of   other   users + k = 1 n 1 ξ 2 b k P R g n x m , k interference   of   imperfect   SIC + w D n .
At the relay node, the SIC removes the interference signal of the other users having stronger power, therefore, in the case of perfect SIC, the signal to interference plus noise ratio (SINR) of the ( m , n ) th user at the relay node is expressed by γ R , n , and from (9), it can be calculated as
γ R , n = P S a n | h m w m | 2 i = n + 1 N P S a i | h m w m | 2 + σ R , n 2 .
In the case of imperfect SIC, due to channel estimation error and remaining interference, the term h m w m k = 1 n 1 ξ 1 a k P S x m , k in (9) is not equals to zero and it depends on the quality of the SIC structure. As a result, the instantaneous SINR in this case is given by
γ R , n i p S I C = P S a n | h m w m | 2 i = n + 1 N P S a i | h m w m | 2 + | h m w m | 2 ξ 1 k = 1 n 1 a k P S + σ R 2 ,
where ξ 1 represents the impact level of residual interference at the relay.
From (12), the SINR at the ( m , n ) th user in the case of perfect SIC is calculated as follows. Note that, in case the power for ( m , i ) th user is larger than that for ( m , n ) th user, i.e., n i or b n b i , then the SINR of x m , i at the ( m , n ) th user can also be expressed as
γ D , i = { (15a) P R b i | g n | 2 k = i + 1 N b k P R | g n | 2 + σ D , n 2 , if   i   <   N , (15b) P R b i | g n | 2 σ D , n 2 , if   i   =   N .
When x m , i is decoded successfully, i.e., γ D , i γ th i , the x m , i is removed from the ( m , n ) th user’s SIC structure, here γ th i is the threshold of SINR of the user. The SIC performs continuously at the ( m , n ) th user until its own signal is decoded successfully.
In the case of imperfect SIC, the SINR of x m , i at the ( m , n ) th user with n i is given as
γ D , i i p S I C = P R b i | g n | 2 k = i + 1 N b k P R | g n | 2 + j = 1 i 1 ξ 2 b j P R | g n | 2 + σ D , n 2 .
where ξ 2 represents the impact level of residual interference at the ( m , n ) th user.
Moreover, with the DF protocol, the end-to-end SINR is defined as the minimum value of the two hops, BS R and R D n , consequently, we have
γ e 2 e = min ( γ R , n , γ D , n ) .

3. Performance Analysis

3.1. Outage Probability

The outage probability (OP) is defined as the probability of an event in which the transmission rate of the system is lower than the minimum required data rate. In this section, the OP of the considered ( m , n ) th user is derived in two cases of the perfect and imperfect SICs.
Let r 1 and r n (bit/s/Hz) denote the minimum required data rate of two links, BS R and R D n , respectively. To simplify calculations, set r 1 = r n = r . Therefore, the OP of the ( m , n ) th user can be defined as
OP D n = Pr 1 α 2 log 2 1 + γ e 2 e = Pr γ e 2 e < 2 2 r 1 α 1
By substituting γ e 2 e from (17) into (18), the OP of ( m , n ) th user can be calculated as
OP D n = Pr min ( γ R n , γ D n ) < γ th = 1 Pr γ R n γ th , γ D n γ th ,
here γ th = 2 2 r 1 α 1 .
Based on the equations of SNR given in (13) and (15a), the OP in case of perfect SIC can be calculated as in (20).
OP D n = 1 Pr P S a n | h m w m | 2 i = n + 1 N P S a i | h m w m | 2 + σ R 2 γ th , P R b n | g n | 2 i = n + 1 N b i P R | g n | 2 + σ D , n 2 γ th ,
In the case of imperfect SIC, from (14) and (16), the outage probability is derived as follows.
OP D n i p S I C = 1 Pr P S a n | h m w m | 2 i = n + 1 N P S a i | h m w m | 2 + | h m w m | 2 ξ 1 k = 1 n 1 a k P S + σ R 2 γ th , P R b n | g n | 2 i = n + 1 N b i P R | g n | 2 + k = 1 n 1 ξ 2 b k P R | g n | 2 + σ D , n 2 γ th .
Set X = | h m w m | 2 and Y = | g n | 2 for notation convenience. Since the normalized w m is designed independently with h m , the | h m w m | 2 is Chi-square distributed with 2 K degree of freedom (If a variable is random and has Chi-square distribution with K degree of freedom, it becomes sum of Rayleigh distribution ([39], p. 16)), and K = N t ( N r ( M + 1 ) ) [33], and | g n | 2 is Chi-square distributed with two degree of freedom. Hence, the CDF and PDF of X are given as
F X ( x ) = 1 exp x ( 1 ρ ) Ω SR k = 0 K 1 1 k ! x ( 1 ρ ) Ω SR k ,
f X ( x ) = x K 1 Γ ( K ) [ ( 1 ρ ) Ω SR ] K exp x ( 1 ρ ) Ω SR .
Based on the ordered statistics, the PDF of channel gain | g n | 2 can be written as ([40], Equation (6.58)).
f | g n | 2 ( y ) = N ! ( N n ) ! ( n 1 ) ! j = 0 N n ( 1 ) j N n j f | g j | 2 ( y ) F | g j | 2 ( y ) n + j 1 ,
where
f | g j | 2 ( y ) = 1 ( 1 ρ ) Ω RD j exp y ( 1 ρ ) Ω RD j ,
F | g j | 2 ( y ) = 1 exp y ( 1 ρ ) Ω RD j .
The corresponding CDF of | g n | 2 is given by
F | g n | 2 ( y ) = N ! ( N n ) ! ( n 1 ) ! j = 0 N n ( 1 ) j n + j N n j 1 exp y ( 1 ρ ) Ω RD j n + j ,
Using the binomial expansion for (27) we have
F | g n | 2 ( y ) = N ! ( N n ) ! ( n 1 ) ! j = 0 N n ( 1 ) j n + j N n j = 0 n + j ( 1 ) n + j exp y ( 1 ρ ) Ω RD j .
As a result, the OP in two cases of the perfect and imperfect SICs is evaluated through the CDF and PDF of both S-R and R-D hops.
The Equation (20) can be represented as
OP D n = Δ 1 Pr X γ th σ R 2 P S ( a n γ th a ˜ ) , X Y γ th σ D , n 2 P S ϕ ( b n γ th b ˜ ) ,
where ϕ = 2 α η 1 α , a ˜ = i = n + 1 N a i and b ˜ = i = n + 1 N b i . The = Δ means that conditions, the a n > γ th a ˜ and b n > γ th b ˜ , need to be satisfied. If not, a n γ th a ˜ or b n γ th b ˜ , the outage always happens because X , Y ( 0 , ) is considered only. Hence, the power allocated for the D n is more than the power of the others.
Based on the theory of joint probability of two random variables [41], the Equation (29) can be represented as
OP D n = 1 u 1 F Y v x f X ( x ) d x = 1 u f X ( x ) d x I 1 + u F Y v x f X ( x ) d x I 2 ,
where u = γ th σ R 2 P S ( a n γ th a ˜ ) and v = γ th σ D , n 2 P S ϕ ( b n γ th b ˜ ) .
Substituting (23) into (30), we obtain I 1 as
I 1 = 1 Γ ( K ) [ ( 1 ρ ) Ω SR ] K u x K 1 exp x ( 1 ρ ) Ω SR d x .
Thank to the help of ([32], Equation (3.351.2)), we have
I 1 = 1 Γ ( K ) Γ K , γ th σ R 2 P S ( a n γ th a ˜ ) ( 1 ρ ) Ω SR .
Substituting (23) and (28) into (30), we obtain I 2 as in (33).
I 2 = N ! ( N n ) ! ( n 1 ) ! j = 0 N n ( 1 ) j n + j N n j = 0 n + j ( 1 ) n + j 1 Γ ( K ) [ ( 1 ρ ) Ω SR ] K × u x K 1 exp v x ( 1 ρ ) Ω RD j exp x ( 1 ρ ) Ω SR d x .
To calculate exactly I 2 , we can use expansion in series for exponential function as in [42], i.e., exp a x = t = 0 ( 1 ) t t ! a x t . Thus, I 2 is rewritten by
I 2 = N ! ( N n ) ! ( n 1 ) ! j = 0 N n ( 1 ) j n + j N n j = 0 n + j ( 1 ) n + j 1 Γ ( K ) [ ( 1 ρ ) Ω SR ] K × t = 0 ( 1 ) t t ! v ( 1 ρ ) Ω RD j t u x q exp x ( 1 ρ ) Ω SR d x Δ 1 , where q = K 1 t .
To calculate Δ 1 in (34), we consider two cases of power index, i.e., q 0 and q < 0 . Using ([32], Equation (3.351.2)) for the case of q 0 and exponential integral function for the case of q < 0 . The exponential integral function have been defined by Schloemilch as in ([43], [5.1.4]).
E n ( z ) = 1 e z t t n d t .
Finally, we have Δ 1 as in (36) and (37).
Δ 1 = 1 ( 1 ρ ) Ω SR q 1 Γ q + 1 , u ( 1 ρ ) Ω SR , if   q 0 .
Δ 1 = 1 u q 1 E q u ( 1 ρ ) Ω SR , if   q < 0
In the case of the transmit power is high enough, i.e., u = γ th σ R 2 P S ( a n γ th a ˜ ) 0 , we have I 1 = 1 . Hence, the closed-form of OP D n can be simplified as follows.
OP D n N ! ( N n ) ! ( n 1 ) ! j = 0 N n ( 1 ) j n + j N n j = 0 n + j ( 1 ) n + j 1 Γ ( K ) [ ( 1 ρ ) Ω SR ] K × 0 x K 1 exp v x ( 1 ρ ) Ω RD j x ( 1 ρ ) Ω SR d x .
Based on ([32], Equation (3.471.9)), an approximation of I 2 is evaluated as
OP D n N ! ( N n ) ! ( n 1 ) ! j = 0 N n ( 1 ) j n + j N n j = 0 n + j ( 1 ) n + j 1 Γ ( K ) [ ( 1 ρ ) Ω SR ] K × 2 v Ω SR Ω RD j K 2 K K 4 v ( 1 ρ ) 2 Ω SR Ω RD j ,
where K K expresses the modified Bessel function of the second kind of order K.
On the other hand, in the case of imperfect SIC, (21) can be rewritten as
OP D n ipSIC = Δ 1 Pr X γ th σ R 2 P S [ a n γ th ( β 1 + β 2 ) ] , X Y γ th σ D , n 2 P S ϕ [ b n γ th ( ψ 1 + ψ 2 ) ] ,
where β 1 = i = n + 1 N a i , β 2 = ξ 1 k = 1 n 1 a k and ψ 1 = i = n + 1 N b i , ψ 2 = ξ 2 k = 1 n 1 b k .
Similarly to the case of perfect SIC, based on the theory of joint probability of two random variable function, we have the OP under imperfect SIC as
OP D n ipSIC = 1 μ 1 F Y λ x f X ( x ) d x = 1 μ f X ( x ) d x J 1 + μ F Y λ x f X ( x ) d x J 2 ,
where μ = γ th σ R 2 P S [ a n γ th ( β 1 + β 2 ) ] and λ = γ th σ D , n 2 P S ϕ [ b n γ th ( ψ 1 + ψ 2 ) ] .
Similar to the case of perfect SIC and based on CDF and PDF given in (22) and (23), the result of imperfect SIC is described as follows.
J 1 = 1 Γ ( K ) Γ K , γ th σ R 2 P S [ a n γ th ( β 1 + β 2 ) ] ( 1 ρ ) Ω SR .
Besides, J 2 can be obtained as follows.
J 2 = N ! ( N n ) ! ( n 1 ) ! j = 0 N n ( 1 ) j n + j N n j = 0 n + j ( 1 ) n + j 1 Γ ( K ) [ ( 1 ρ ) Ω SR ] K × t = 0 ( 1 ) t t ! λ ( 1 ρ ) Ω RD j t μ x q exp x ( 1 ρ ) Ω SR d x Δ 2 , where q = K 1 t .
By replacing the inner parameters for the corresponding variables, we have Δ 2 as in (44) and (45).
Δ 2 = 1 ( 1 ρ ) Ω SR q 1 Γ q + 1 , γ th σ R 2 ( 1 ρ ) Ω SR P S [ a n γ th ( β 1 + β 2 ) ] , if   q 0 .
Δ 2 = P S [ a n γ th ( β 1 + β 2 ) ] γ th σ R 2 q 1 E q γ th σ R 2 ( 1 ρ ) Ω SR P S [ a n γ th ( β 1 + β 2 ) ] , if   q < 0

3.2. Ergodic Rate

Before investigating the ergodic rate of the system, we examine the result that had been shown in [44], i.e., the transmission power of the relay is often smaller than the transmission power of the BS because the relay node is supplied by harvesting energy. In Figure 4, the probabilities of γ SR and γ RD are compared. It is clear that γ RD is always less than γ SR . Therefore, the probability that γ RD n < γ th is always higher than the probability that γ SR < γ th . This ensures that min ( γ SR , γ RD n ) = γ RD n and it can be considered to be a crucial factor that limits the performance of such systems.
Based on the above analysis and Claude Shannon theory, the instantaneous data rate of ( m , n ) th user is given by
R m , n = 1 α 2 log 2 1 + P R b n | g n | 2 b ˜ P R | g n | 2 + ψ 2 P R | g n | 2 + σ D , n 2 = 1 α 2 log 2 P R | g n | 2 ( b ˜ + ψ 2 + b n ) + σ D , n 2 b ˜ P R | g n | 2 + ψ 2 P R | g n | 2 + σ D , n 2 .
We can rewrite (46) as
R m , n = 1 α 2 log 2 1 + ϕ Ψ | h m w m | 2 | g n | 2 ( b ˜ + ψ 2 + b n ) 1 α 2 log 2 1 + ϕ Ψ | h m w m | 2 | g n | 2 ( b ˜ + ψ 2 ) ,
where Ψ = P S σ D n 2 is the received signal to noise ratio.
To simplify, we let Γ 1 = ϕ Ψ | h m w m | 2 | g n | 2 ( b ˜ + ψ 2 + b n ) and Γ 2 = ϕ Ψ | h m w m | 2 | g n | 2 ( b ˜ + ψ 2 ) . Thus, we have CDFs of Γ 1 and Γ 2 given as
F Γ 1 ( γ 1 ) = 1 n = 1 N N n 2 ( 1 ) n 1 Γ ( K ) [ ( 1 ρ ) Ω SR ] K n γ 1 Ω SR Ω RD j ϕ Ψ B K 2 K K 4 n γ 1 ( 1 ρ ) 2 Ω SR ϕ Ψ B Ω RD j ,
and
F Γ 2 ( γ 2 ) = 1 n = 1 N N n 2 ( 1 ) n 1 Γ ( K ) [ ( 1 ρ ) Ω SR ] K n γ 2 Ω SR Ω RD j ϕ Ψ C K 2 K K 4 n γ 2 ( 1 ρ ) 2 Ω SR ϕ Ψ C Ω RD j ,
where B = ( b ˜ + b n + ψ 2 ) , C = ( b ˜ + ψ 2 ) . F Γ 1 ( γ ) and F Γ 2 ( γ ) are solved in Appendix A.
Based on (47), the ergodic rate can be calculated as
E [ R m , n ] = 1 α 2 E log 2 1 + Γ 1 C 1 1 α 2 E log 2 1 + Γ 2 C 2 .
Expression (50) follows the strictly monotonically increasing property of the logarithm function for non-negative real numbers.
C 1 = 1 α 2 ln 2 0 log 2 ( 1 + Γ 1 ) f Γ 1 ( γ 1 ) d γ 1 .
Based on the properties of the expected value of a random variable, using the integration-by-parts method, we have
C 1 = 1 α 2 ln 2 0 b log 2 ( 1 + Γ 1 ) d [ F Γ 1 ( γ 1 ) 1 ] = 1 α 2 ln 2 log 2 ( 1 + Γ 1 ) [ F Γ 1 ( b ) 1 ] 1 α 2 ln 2 0 b F Γ 1 ( γ 1 ) 1 1 + γ 1 d γ 1 .
F Γ 1 ( γ 1 ) is CDF of Γ 1 , thus when b is a finite value, it is seen that log 2 ( 1 + Γ 1 ) [ F Γ 1 ( b ) 1 ] = 0 . Thus, C 1 is given as
C 1 = 1 α 2 ln 2 0 1 F Γ 1 ( γ 1 ) 1 + γ 1 d γ 1 .
Similar to the working step in (51), we can rewrite the second part as the following equation.
C 2 = 1 α 2 ln 2 0 log 2 ( 1 + Γ 2 ) f Γ 2 ( γ 2 ) d γ 2 = 1 α 2 ln 2 0 1 F Γ 2 ( γ 1 ) 1 + γ 2 d γ 2 ,
where the F Γ 1 ( γ ) and F Γ 2 ( γ ) are given in (48) and (49).
With the help of ([32], Equation (7.811.5)) and ([32], Equation (9.343)), after some manipulations, we have C 1 and C 2 as
C 1 = 1 α 2 ln 2 n = 1 N N n ( 1 ) n 1 Γ ( K ) [ ( 1 ρ ) Ω SR ] K n Ω SR Ω RD j ϕ Ψ B K 2 G 1 , 3 3 , 1 n ( 1 ρ ) 2 Ω SR ϕ Ψ B Ω RD j K 2 , K 2 , K 2 K 2 ,
and
C 2 = 1 α 2 ln 2 n = 1 N N n ( 1 ) n 1 Γ ( K ) [ ( 1 ρ ) Ω SR ] K n Ω SR Ω RD j ϕ Ψ C K 2 G 1 , 3 3 , 1 n ( 1 ρ ) 2 Ω SR ϕ Ψ C Ω RD j K 2 , K 2 , K 2 K 2 .
The proof is shown in Appendix A.

4. Numerical Results

In this section, the performance of the proposed SWIPT-NOMA system in terms of the outage probability and ergodic rate is numerically analyzed. The simulation parameters are set as follows. The Monte Carlo simulations is run with 2 × 10 14 trials. The variance of noise component at all receiving nodes is assumed to be constant, σ 2 = 1 . The average channel gain E { | h m | 2 } = Ω SR m = E { | g 1 | 2 } = Ω R m D 1 = 1 , E { | g 2 | 2 } = Ω R m D 2 = 2 and E { | g 3 | 2 } = Ω R m D 3 = 4 .
The threshold data rates of D n : r 1 = r 2 = r 3 = 1 [ b / s / Hz ] . The energy conversion efficiency coefficient of R : η = 0.85 . The number of relay nodes: M = 3 and each cluster has three users severed instantaneously by each relay node. The power allocation coefficient of the nth user: a n = ( N n + 1 ) / μ , where μ is chosen such that n = 1 N a n P S = 1 . To simplify the system design and settings, we assume that the power allocation coefficients at the BS and the relay nodes are the same.
Firstly, users are grouped randomly into clusters according to Poisson distribution in two cases of the λ parameter values, λ can be considered to be an expected value of the number of such events, in which an event is that a user appears in a cluster. Only three users with the best channel conditions are supported by the relay node at the same time, and the OPs of every user in both cases of λ are illustrated in Figure 5. As can be seen from this figure, if the transmission power is high enough, the OPs evaluated by exact analysis and approximation are the same, demonstrating that the proposed methods to calculate the OP are significantly reasonable and actually accurate. Moreover, while the transmission power is assigned for signal of user 1 with the highest value and user 3 with the lowest value, the OP of user 3 is the lowest, in other words, user 3 has the best quality. The reason is that the total interference affected to user 1 consists of signals of both user 2 and user 3, and its own noise, while the total interference influenced on user 3 contains its own noise only owing to the perfect SIC. Furthermore, the system performance is improved if the λ parameter increases. The reason is explained as when the λ rises, the number of users appears in a cluster goes up, resulting in the selection of three users with the best channel conditions is more efficient.
In Figure 6, the proposed system is investigated in such scenario that users are fixed and randomly grouped according to Poison rule with the average value of the λ parameter. It is clear that when the number of transmitting antennas of the BS increases, the system performance is enhanced. There are two reasons, i.e., the diversity gain of the link between BS-R is improved and the harvested energy at the relay node rises or transmission power of the relay node rises and then the messages are sent from the relay node more dependably. In addition, the system performance in case of random user distribution may be better than that in case of fixed user distribution. The reason is that if users are fixed, the channel gains are likely to be fixed and then the selection of three users with best channel condition is less effective than that in case of random distribution. Finally, the results in exact analysis and approximation are absolutely the same at high enough SNR region, once again, confirming the accuracy of the proposed methods.
The effect of channel estimation error on the OP of the system is illustrated in Figure 7. The curves show that increasing ρ , i.e., increasing estimation error, results in a reduction of the OP performance. This result demonstrates that the channel estimation error influences significantly on the system performance. In fact, the instantaneous CSI not only affects to coding gain but also causes leakage beam also. Finally, the Monte Carlo simulation guarantees the correctness of the exact and approximation analytical results.
In Figure 8, the OP of users versus SNR in two cases of perfect and imperfect SICs are represented. In this figure, the OP of imperfect SIC is higher than that of perfect SIC and the OP of user 1 are the same in two cases. In fact, user 1 does not employ the SIC structure, it decodes its own signal by considering the other users’ signals as interference. However, the residual power of user 1 impacts to the decoding process of the other users. Different from the case of perfect SIC, the quality of user 3 is least of all among users in the scenario of imperfect SIC. It is because the residual power, that plays as interference, at user 3, it is the largest. The provided simulation results confirm the accuracy of the proposed analytical method, and the approximation is the same with simulation in the medium and high SINR regions.
Figure 9 demonstrates the impact of the time fraction of EH, 0 < α < 1 , on the OP of users. In fact, the optimal α is a sophisticated function of the channel and system parameters. The smaller α results in the smaller energy for relay nodes, however, the larger α brings the smaller transmission power for communication of the BS. Therefore, if the α increases from 0 to 1, the OP reduces to an optimal value and then increases again. As a result, the optimal α corresponding to the smallest OP is determined by this plot. In the figure, the minimum values of OP for every user are different although the setting parameters are the same. Moreover, the optimal time duration for EH of user 3 is the largest. The reason is that the power allocation for user 3 is the smallest, consequently, it needs longer time duration for EH to ensure the transmission power of the relay node to forward signals.
Figure 10 demonstrates the ER of users versus SINR in the case of perfect SIC. In this figure, the ER can be considered to be a function of the mean SINR, based on the derived results in (55) and (56). Figure 10 shows that the ERs of users 1 and 2 increase negligibly in the low SINR region and remain stable in the high SINR region; however, that of user 3 increases exponentially. There is a trade-off between the complexity and the performance, i.e., user 1 directly detected its own signal, whereas the users 2 and 3 have the first-order and second-order of the SIC, respectively.
The sum ER of the system is demonstrated in Figure 11 for two cases, i.e., perfect and imperfect SICs. Firstly, the simulation results are the same with analytical results. Secondly, the sum ER in the case of perfect SIC is higher than that in the case of imperfect SIC, especially the gap of them increases when the SINR increases. The reason can be explained as if SINR increases by rising the transmission power, the interference due to imperfect SIC also increases, consequently, the sum ER with imperfect SIC goes up less significantly than that with perfect SIC. Finally, the ERs of user 1 are the same in both cases because when user 1 decodes the signal, the SIC scheme is not used.
Figure 12 demonstrates the sum ER of the system versus SNR with the following settings. The number of users is 12, there are three typical user clustering modes, and the imperfect SIC coefficients are ξ 1 = ξ 2 = 0.06 . As shown in Figure 12, the first mode has the best performance due to the lowest cross user interference. In contrast, the third mode achieves the worst performance because when the number of users in the cluster increases, the cross user interference rises. It is worth noting that the number of users and the number of clusters determine the number of beams and the order of SIC. As a result, we can dynamically select the user clustering mode according to system parameters and channel conditions for balancing the overall performance and the computational complexity. In addition, the proposed multiple relay aided MIMO-NOMA scheme and a MIMO-NOMA scheme without relay are compared in Figure 12. It is obvious that the proposed scheme has much better performance than the scheme without relay. In fact, the scheme without relay has lower channel gains than the proposed scheme, i.e., Ω BS D 1 = 0.5 , Ω BS D 2 = 1 and Ω BS D 3 = 2 , because of the longer distance from point to point (BS, R or D). Moreover, in the proposed scheme, the inter-relay interference can be effectively canceled.

5. Conclusions

In this paper, a combination design of NOMA, SWIPT, and beamforming is proposed for the downlink of multi-user relaying systems. To analyze and evaluate the system performance, the outage probability and ergodic capacity are derived based on analytics and statistics. The proposed system is investigated obviously in two cases of the perfect and imperfect SIC structures, and the effect of the imperfect CSI is also taken into consideration. Moreover, an optimal time fraction of energy harvesting is found out to minimize the outage probability and the reasonable user clustering mode is discussed. The analytical and simulation results demonstrate the accuracy of the proposed analysis method. In the future, the authors will investigate the system with a full-duplex model to improve the spectrum efficiency and apply the power splitting scheme to the SWIPT with the finite block-length.

Author Contributions

Conceptualization, T.C.H. and P.T.H.; methodology, T.M.H., N.L.C.; software, D.T.Q.; validation, T.C.H. and P.T.H.; formal analysis, T.M.H., N.L.C. and D.T.Q.; investigation, T.M.H.; resources, T.C.H.; data curation, P.T.H.; writing–original draft preparation, T.M.H. and D.T.Q.; writing–review and editing, T.C.H., N.L.C. and P.T.H.; supervision, P.T.H.; project administration, P.T.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AFamplify-and-forward
AWGNAdditive white Gaussian noise
BSBase station
CDFCumulative distribution function.
CSIChannel state information
DFDecode-and-forward
EHEnergy harvesting
ERErgodic rate
IoTInternet of Things
i.i.dIndependent and identically distributed
MIMOMultiple input multiple output
MMSEMinimum mean squared error
NOMANon-orthogonal multiple access
MUMulti-user
OPOutage probability
PDFProbability density function
RFRadio Frequency
SCISuccessive interference cancellation
SINRSignal to interference plus noise ratio
SNRSignal to noise ratio
SWIPTSimultaneous wireless information and power transfer
TSTime switching
ZFBFZero-force beamforming

Appendix A

To obtain the closed-form expressions of ER, we begin with the joint probability of two random variables as follows.
In previous sections, let Γ 1 = ϕ Ψ | h m w m | 2 | g n | 2 ( b ˜ + ψ 2 + b n ) and Γ 2 = ϕ Ψ | h m w m | 2 | g n | 2 ( b ˜ + ψ 2 ) , we have
F Γ 1 ( γ 1 ) = Pr X Y γ 1 ϕ Ψ ( b ˜ + b n + ψ 2 ) = 0 Pr Y γ 1 x ϕ Ψ ( b ˜ + b n + ψ 2 ) f X ( x ) d x .
Note that F | g n | 2 ( ) = 1 and we let y . Hence, from (27), it is easy to have N ! ( N n ) ! ( n 1 ) ! j = 0 N n ( 1 ) j n + j N n j = 1 . Thus, we can rewrite (27) as
F | g n | 2 ( y ) = 1 n = 1 N N n ( 1 ) n 1 exp n y ( 1 ρ ) Ω RD j .
Substituting (26) and (A2) into (A1), we have
F Γ 1 ( γ 1 ) = 1 n = 1 N N n ( 1 ) n 1 Γ ( K ) [ ( 1 ρ ) Ω SR ] K Φ 1 ( γ 1 ) ,
where
Φ 1 ( γ 1 ) = 0 x K 1 exp n γ 1 x ( 1 ρ ) Ω RD j ϕ Ψ B x ( 1 ρ ) Ω SR d x ,
with B = ( b ˜ + b n + ψ 2 ) .
Using ([32], Equation (3.471.9)), Φ 1 ( γ 1 ) is obtained as
Φ 1 ( γ 1 ) = n γ 1 Ω SR Ω RD j ϕ Ψ B K 2 K K 4 n γ 1 ( 1 ρ ) 2 Ω SR ϕ Ψ B Ω RD j .
Similar to above steps, the CDF of Γ 2 is evaluated as
F Γ 2 ( γ 2 ) = Pr X Y γ 2 ϕ Ψ ( b ˜ + ψ 2 ) = 0 Pr Y γ 2 x ϕ Ψ ( b ˜ + ψ 2 ) f X ( x ) d x .
F Γ 2 ( γ 2 ) = 1 n = 1 N N n ( 1 ) n 1 Γ ( K ) [ ( 1 ρ ) Ω SR ] K Φ 2 ( γ 2 ) ,
where
Φ 2 ( γ 2 ) = n γ 2 Ω SR Ω RD j ϕ Ψ C K 2 K K 4 n γ 2 ( 1 ρ ) 2 Ω SR ϕ Ψ C Ω RD j ,
with C = ( b ˜ + ψ 2 ) .
Substituting (A6) and (A7) into (53) and (54), respectively, we have
C 1 = 1 α 2 ln 2 n = 1 N N n ( 1 ) n 1 Γ ( K ) [ ( 1 ρ ) Ω SR ] K n Ω SR Ω RD j ϕ Ψ B K 2 0 γ 1 K 2 1 + γ 1 K K 4 n γ 1 ( 1 ρ ) 2 Ω SR ϕ Ψ B Ω RD j d γ 1 ,
with ([32], Equation (9.343)),
K v ( x ) x μ = 2 μ 1 G 02 20 1 4 x 2 1 2 μ + 1 2 v , 1 2 μ 1 2 v .
Thank to the help of the ([32], Equation (7.811.5)) and after some manipulations, the average rate is derived as in (55).
To find the average rate C 2 , a similar procedure is performed, and proof is completed.

References

  1. Khutsoane, O.; Isong, B.; Gasela, N.; Abu-Mahfouz, A.M. WaterGrid-Sense: A LoRa-Based Sensor Node for Industrial IoT Applications. IEEE Sens. J. 2020, 20, 2722–2729. [Google Scholar] [CrossRef]
  2. Meneghello, F.; Calore, M.; Zucchetto, D.; Polese, M.; Zanella, A. IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices. IEEE Internet Things J. 2019, 6, 8182–8201. [Google Scholar] [CrossRef]
  3. Verma, A.; Prakash, S.; Srivastava, V.; Kumar, A.; Mukhopadhyay, S.C. Sensing, Controlling, and IoT Infrastructure in Smart Building: A Review. IEEE Sens. J. 2019, 19, 9036–9046. [Google Scholar] [CrossRef]
  4. Chettri, L.; Bera, R. A Comprehensive Survey on Internet of Things (IoT) toward 5G Wireless Systems. IEEE Internet Things J. 2020, 7, 16–32. [Google Scholar] [CrossRef]
  5. Wang, D.; Chen, D.; Song, B.; Guizani, N.; Yu, X.; Du, X. From IoT to 5G I-IoT: The Next Generation IoT-Based Intelligent Algorithms and 5G Technologies. IEEE Commun. Mag. 2018, 56, 114–120. [Google Scholar] [CrossRef]
  6. Liu, Y.; Qin, Z.; Elkashlan, M.; Ding, Z.; Nallanathan, A.; Hanzo, L. Non orthogonal Multiple Access for 5G and Beyond. IEEE J. Sel. Top. Signal Process. 2017, 105, 2347–2381. [Google Scholar]
  7. Liu, Y.; Qin, Z.; Elkashlan, M.; Nallanathan, A.; McCann, J.A. Non-orthogonal multiple access in large-scale heterogeneous networks. IEEE J. Sel. Areas Commun. 2017, 35, 2667–2680. [Google Scholar] [CrossRef] [Green Version]
  8. Liu, G.; Wang, Z.; Hu, J.; Ding, Z.; Fan, P. Cooperative NOMA Broadcasting/Multicasting for Low-Latency and High-Reliability 5G Cellular V2X Communications. IEEE Internet Things J. 2019, 6, 7828–7838. [Google Scholar] [CrossRef]
  9. Vamvakas, P.; Tsiropoulou, E.E.; Papavassiliou, S. Risk-aware resource control with flexible 5G access technology interfaces. In Proceedings of the 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Washington, DC, USA, 10–12 June 2019; pp. 1–9. [Google Scholar]
  10. Elbamby, M.S.; Bennis, M.; Saad, W.; Debbah, M.; Latva-Aho, M. Resource optimization and power allocation in in-band full duplex-enabled non-orthogonal multiple access networks. IEEE J. Sel. Commun. 2017, 35, 2860–2873. [Google Scholar] [CrossRef]
  11. Choi, J. Minimum power multicast beamforming with superposition coding for multiresolution broadcast and application to NOMA systems. IEEE Trans. Commun. 2015, 63, 791–800. [Google Scholar] [CrossRef]
  12. Du, C.; Chen, X.; Lei, L. Energy-efficient optimisation for secrecy wireless information and power transfer in massive MIMO relaying systems. IET Commun. 2016, 11, 10–16. [Google Scholar] [CrossRef]
  13. Sun, R.; Wang, Y.; Wang, X.; Zhang, Y. Transceiver Design for Cooperative Non-Orthogonal Multiple Access Systems with Wireless Energy Transfer. IET Commun. 2016, 10, 1947–1955. [Google Scholar] [CrossRef] [Green Version]
  14. Han, W.; Ge, J.; Men, J. Performance Analysis for NOMA Energy Harvesting Relaying Networks with Transmit Antenna Selection and Maximal-Ratio Combining over Nakagami-m Fading. IET Commun. 2016, 10, 2687–2693. [Google Scholar] [CrossRef]
  15. Liu, Y.; Ding, Z.; Elkashlan, M.; Poor, H.V. Cooperative non-orthogonal multiple access with simultaneous wireless information and power transfer. IEEE J. Sel. Areas Commun. 2016, 34, 938–953. [Google Scholar] [CrossRef] [Green Version]
  16. Perera, T.D.P.; Jayakody, D.N.K.; Sharma, S.K.; Chatzinotas, S.; Li, J. Simultaneous Wireless Information and Power Transfer (SWIPT): Recent Advances and Future Challenges. IEEE Commun. Surv. Tutor. 2017. [Google Scholar] [CrossRef] [Green Version]
  17. Hoang, T.M.; Duy, T.T.; Bao, V.N.Q. On the performance of non-linear wirelessly powered partial relay selection networks over Rayleigh fading channels. In Proceedings of the 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS 2016), Danang City, Vietnam, 14–16 September 2016; pp. 6–11. [Google Scholar]
  18. Zhong, C.; Suraweera, H.A.; Huang, A.; Zhang, Z.; Yuen, C. Outage probability of dual-hop multiple antenna AF relaying systems with interference. IEEE Trans. Commun. 2013, 61, 108–119. [Google Scholar] [CrossRef]
  19. Mohammadi, M.; Chalise, B.K.; Suraweera, H.A.; Zhong, C.; Zheng, G.; Krikidis, I. Throughput Analysis and Optimization of Wireless-Powered Multiple Antenna Full-Duplex Relay Systems. IEEE Trans. Commun. 2016, 64, 1769–1785. [Google Scholar] [CrossRef] [Green Version]
  20. Zhu, G.; Zhong, C.; Suraweera, H.A.; Karagiannidis, G.K.; Zhang, Z.; Tsiftsis, T.A. Wireless information and power transfer in relay systems with multiple antennas and interference. IEEE Trans. Commun. 2015, 63, 1400–1418. [Google Scholar] [CrossRef]
  21. Gui, L.; Shi, Y.; Cai, W.; Shu, F.; Zhou, X.; Liu, T. Design of incentive scheme using contract theory in energy-harvesting enabled sensor networks. Phys. Commun. 2018, 28, 166–175. [Google Scholar] [CrossRef]
  22. Lee, G.; Saad, W.; Bennis, M.; Mehbodniya, A.; Adachi, F. Online ski rental for on/off scheduling of energy harvesting base stations. IEEE Trans. Wirel. Commun. 2017, 16, 2976–2990. [Google Scholar] [CrossRef]
  23. Vamvakas, P.; Tsiropoulou, E.E.; Vomvas, M.; Papavassiliou, S. Adaptive power management in wireless powered communication networks: A user-centric approach. In Proceedings of the 2017 IEEE 38th Sarnoff Symposium, Newark, NJ, USA, 18–20 September 2017; pp. 1–6. [Google Scholar]
  24. Ding, Z.; Perlaza, S.M.; Esnaola, I.; Poor, H.V. Power allocation strategies in energy harvesting wireless cooperative networks. IEEE Trans. Wirel. Commun. 2014, 13, 846–860. [Google Scholar] [CrossRef] [Green Version]
  25. Huang, K.; Lau, V.K. Enabling wireless power transfer in cellular networks: Architecture, modeling and deployment. IEEE Trans. Commun. 2014, 13, 902–912. [Google Scholar] [CrossRef] [Green Version]
  26. Xu, C.; Zheng, M.; Liang, W.; Yu, H.; Liang, Y.C. Outage performance of underlay multihop cognitive relay networks with energy harvesting. IEEE Commun. Lett. 2016, 20, 1148–1151. [Google Scholar] [CrossRef]
  27. Liu, Y.; Wang, L.; Zaidi, S.A.R.; Elkashlan, M.; Duong, T.Q. Secure D2D communication in large-scale cognitive cellular networks: A wireless power transfer model. IEEE Trans. Wirel. Commun. 2016, 64, 329–342. [Google Scholar] [CrossRef]
  28. Zhong, C.; Chen, X.; Zhang, Z.; Karagiannidis, G.K. Wireless-powered communications: Performance analysis and optimization. IEEE Trans. Commun. 2015, 63, 5178–5190. [Google Scholar] [CrossRef] [Green Version]
  29. Ma, Y.; Chen, H.; Lin, Z.; Li, Y.; Vucetic, B. Distributed and optimal resource allocation for power beacon-assisted wireless-powered communications. IEEE Trans. Commun. 2015, 63, 3569–3583. [Google Scholar] [CrossRef] [Green Version]
  30. Vinh, H.D.; Van Son, V.; Hoang, T.M.; Hieu, T.C.; Hiep, P.T. Performance Analysis of NOMA Beamforming Multiple Users Relay Systems. In Proceedings of the 2019 11th International Conference on Knowledge and Systems Engineering (KSE), Da Nang, Vietnam, 24–26 October 2019; pp. 1–5. [Google Scholar]
  31. Hiep, P.T.; Hoang, T.M. Non-orthogonal multiple access and beamforming for relay network with RF energy harvesting. ICT Express 2020, 6, 11–15. [Google Scholar] [CrossRef]
  32. Zwillinger, D. Table of Integrals, Series, and Products; Elsevier: Amsterdam, The Netherlands, 2014. [Google Scholar]
  33. Mukkavilli, K.K.; Sabharwal, A.; Erkip, E.; Aazhang, B. On beamforming with finite rate feedback in multiple-antenna systems. IEEE Trans. Inf. Theory 2003, 49, 2562–2579. [Google Scholar] [CrossRef] [Green Version]
  34. Singhal, C.; De, S. Resource Allocation in Next-Generation Broadband Wireless Access Networks; IGI Global: Hershey, PA, USA, 2017. [Google Scholar]
  35. Tam, H.H.M.; Tuan, H.D.; Nasir, A.A.; Duong, T.Q.; Poor, H.V. MIMO energy harvesting in full-duplex multi-user networks. IEEE Trans. Wirel. Commun. 2017, 16, 3282–3297. [Google Scholar] [CrossRef] [Green Version]
  36. Nasir, A.A.; Zhou, X.; Durrani, S.; Kennedy, R.A. Relaying protocols for wireless energy harvesting and information processing. IEEE Trans. Wirel. Commun. 2013, 12, 3622–3636. [Google Scholar] [CrossRef] [Green Version]
  37. Zhou, X.; Zhang, R.; Ho, C.K. Wireless information and power transfer: Architecture design and rate-energy tradeoff. IEEE Trans. Commun. 2013, 61, 4754–4767. [Google Scholar] [CrossRef] [Green Version]
  38. Rajesh, R.; Sharma, V.; Viswanath, P. Capacity of Gaussian channels with energy harvesting and processing cost. IEEE Trans. Inf. Theory 2014, 60, 2563–2575. [Google Scholar] [CrossRef]
  39. Shankar, P.M. Fading and Shadowing in Wireless Systems; Springer: Berlin/Heidelberg, Germany, 2017. [Google Scholar]
  40. Miller, S.; Childers, D. Probability and Random Processes: With Applications to Signal Processing and Communications; Academic Press: Cambridge, MA, USA, 2012. [Google Scholar]
  41. Papoulis, A.; Pillai, S.U. Probability, Random Variables, and Stochastic Processes; Tata McGraw-Hill Education: New York, NY, USA, 2002. [Google Scholar]
  42. Hoang, T.M.; Tan, N.T.; Hoang, N.H.; Hiep, P.T. Performance analysis of decode-and-forward partial relay selection in NOMA systems with RF energy harvesting. Wirel. Netw. 2019, 25, 4585–4595. [Google Scholar] [CrossRef]
  43. Abramowitz, M.; Stegun, I.A. Handbook of Mathematical Functions: With Formulas, Graphs, and Mathematical Tables; Courier Corporation: North Chelmsford, MA, USA, 1964; Volume 55. [Google Scholar]
  44. Singh, S.; Modem, S.; Prakriya, S. Optimization of cognitive two-way networks with energy harvesting relays. IEEE Commun. Lett. 2017, 21, 1381–1384. [Google Scholar] [CrossRef]
Figure 1. The proposed system model.
Figure 1. The proposed system model.
Sensors 20 04737 g001
Figure 2. The block diagram of the first hop of the proposed multi-relay beamforming scheme.
Figure 2. The block diagram of the first hop of the proposed multi-relay beamforming scheme.
Sensors 20 04737 g002
Figure 3. The time switching-based relaying (TSR) protocol.
Figure 3. The time switching-based relaying (TSR) protocol.
Sensors 20 04737 g003
Figure 4. The comparison between CDF of γ SR and CDF of γ RD .
Figure 4. The comparison between CDF of γ SR and CDF of γ RD .
Sensors 20 04737 g004
Figure 5. The OP versus SNRs of users with parameters as α   =   0.3 , η   =   0.85 , a 1   =   0.6 ,   a 2   =   0.3 ,   a 3   =   0.1 .
Figure 5. The OP versus SNRs of users with parameters as α   =   0.3 , η   =   0.85 , a 1   =   0.6 ,   a 2   =   0.3 ,   a 3   =   0.1 .
Sensors 20 04737 g005
Figure 6. The OP versus SINRs with different numbers of receiving antennas and α   =   0.3 , η   =   0.85 , a 1   =   0.6 ,   a 2   =   0.3 ,   a 3   =   0.1 .
Figure 6. The OP versus SINRs with different numbers of receiving antennas and α   =   0.3 , η   =   0.85 , a 1   =   0.6 ,   a 2   =   0.3 ,   a 3   =   0.1 .
Sensors 20 04737 g006
Figure 7. The OP versus average SNR with different correlation coefficients and α   =   0.3 , η   =   0.85 , a 1   =   0.6 , a 2   =   0.3 , a 3   =   0.1 .
Figure 7. The OP versus average SNR with different correlation coefficients and α   =   0.3 , η   =   0.85 , a 1   =   0.6 , a 2   =   0.3 , a 3   =   0.1 .
Sensors 20 04737 g007
Figure 8. The OP of users in term of imperfect and perfect SIC with residual coefficients of SIC are ξ 1   =   ξ 2   =   0.05 , and α   =   0.3 , η   =   0.85 , a 1   =   0.6 , a 2   =   0.3 , a 3   =   0.1 .
Figure 8. The OP of users in term of imperfect and perfect SIC with residual coefficients of SIC are ξ 1   =   ξ 2   =   0.05 , and α   =   0.3 , η   =   0.85 , a 1   =   0.6 , a 2   =   0.3 , a 3   =   0.1 .
Sensors 20 04737 g008
Figure 9. The optimal time fraction of EH corresponding to minimum OP of users with η   =   0.85 , a 1   =   0.6 , a 2   =   0.3 , a 3   =   0.1 .
Figure 9. The optimal time fraction of EH corresponding to minimum OP of users with η   =   0.85 , a 1   =   0.6 , a 2   =   0.3 , a 3   =   0.1 .
Sensors 20 04737 g009
Figure 10. Compare the ER of users in each cluster for the perfect SIC with η   =   0.85 , a 1   =   0.6 , a 2   =   0.3 , a 3   =   0.1 .
Figure 10. Compare the ER of users in each cluster for the perfect SIC with η   =   0.85 , a 1   =   0.6 , a 2   =   0.3 , a 3   =   0.1 .
Sensors 20 04737 g010
Figure 11. Sum ER of the system versus SINR in two cases of perfect and imperfect SICs with ξ 1   =   ξ 2   =   0.06 .
Figure 11. Sum ER of the system versus SINR in two cases of perfect and imperfect SICs with ξ 1   =   ξ 2   =   0.06 .
Sensors 20 04737 g011
Figure 12. The comparison of 3 different user clustering modes with 12 users, i.e., ( M   =   6 ,   N   =   2 ), ( M   =   4 ,   N   =   3 ) and ( M   =   3 ,   N   =   4 ), and ξ 1   =   ξ 2   =   0.06 .
Figure 12. The comparison of 3 different user clustering modes with 12 users, i.e., ( M   =   6 ,   N   =   2 ), ( M   =   4 ,   N   =   3 ) and ( M   =   3 ,   N   =   4 ), and ξ 1   =   ξ 2   =   0.06 .
Sensors 20 04737 g012
Table 1. The notations.
Table 1. The notations.
NotationDescription
Pr Probability
F X ( x ) Cumulative distribution function (CDF)
f X ( x ) Probability density function (PDF)
CN ( μ , σ 2 ) A circularly symmetric complex Gaussian RV x with mean μ and variance σ 2
E · The statistical expectation operator
Γ ( · ) Gamma function [32]
K n · The second kind of Bessel function, order n [32]
E n ( z ) Exponential integral function n [32]
G p q m n ( x | b s a r ) Meijer’s G-Function [9.3] [32]
MNumber of relay nodes
NNumber of users in each cluster
N t , N r Transmission antennas of BS and reception antennas of relay
ρ A Correlation coefficient
α Time switching ratio
η Conversion efficiency
rData rate threshold

Share and Cite

MDPI and ACS Style

Chi Hieu, T.; Le Cuong, N.; Manh Hoang, T.; Thanh Quan, D.; Thanh Hiep, P. On Outage Probability and Ergodic Rate of Downlink Multi-User Relay Systems with Combination of NOMA, SWIPT, and Beamforming. Sensors 2020, 20, 4737. https://0-doi-org.brum.beds.ac.uk/10.3390/s20174737

AMA Style

Chi Hieu T, Le Cuong N, Manh Hoang T, Thanh Quan D, Thanh Hiep P. On Outage Probability and Ergodic Rate of Downlink Multi-User Relay Systems with Combination of NOMA, SWIPT, and Beamforming. Sensors. 2020; 20(17):4737. https://0-doi-org.brum.beds.ac.uk/10.3390/s20174737

Chicago/Turabian Style

Chi Hieu, Ta, Nguyen Le Cuong, Tran Manh Hoang, Do Thanh Quan, and Pham Thanh Hiep. 2020. "On Outage Probability and Ergodic Rate of Downlink Multi-User Relay Systems with Combination of NOMA, SWIPT, and Beamforming" Sensors 20, no. 17: 4737. https://0-doi-org.brum.beds.ac.uk/10.3390/s20174737

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop