• Title/Summary/Keyword: Closed Access

Search Result 180, Processing Time 0.025 seconds

Analysis on Achievable Data Rate of Asymmetric 2PAM for NOMA

  • Chung, Kyuhyuk
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.34-41
    • /
    • 2020
  • Nowadays, the advanced smart convergences of the artificial intelligence (AI) and the internet of things (IoT) have been more and more important, in the fifth generation (5G) and beyond 5G (B5G) mobile communication. In 5G and B5G mobile networks, non-orthogonal multiple access (NOMA) has been extensively investigated as one of the most promising multiple access (MA) technologies. In this paper, we investigate the achievable data rate for the asymmetric binary pulse amplitude modulation (2PAM), in non-orthogonal multiple access (NOMA). First, we derive the closed-form expression for the achievable data rate of the asymmetric 2PAM NOMA. Then it is shown that the achievable data rate of the asymmetric 2PAM NOMA reduces for the stronger channel user over the entire range of power allocation, whereas the achievable data rate of the asymmetric 2PAM NOMA increases for the weaker channel user improves over the power allocation range less than 50%. We also show that the sum rate of the asymmetric 2PAM NOMA is larger than that of the conventional standard 2PAM NOMA, over the power allocation range larger than 25%. In result, the asymmetric 2PAM could be a promising modulation scheme for NOMA of 5G systems, with the proper power allocation.

Achievable Sum Rate of NOMA with Negatively-Correlated Information Sources

  • Chung, Kyuhyuk
    • International journal of advanced smart convergence
    • /
    • v.10 no.1
    • /
    • pp.75-81
    • /
    • 2021
  • As the number of connected smart devices and applications increases explosively, the existing orthogonal multiple access (OMA) techniques have become insufficient to accommodate mobile traffic, such as artificial intelligence (AI) and the internet of things (IoT). Fortunately, non-orthogonal multiple access (NOMA) in the fifth generation (5G) mobile networks has been regarded as a promising solution, owing to increased spectral efficiency and massive connectivity. In this paper, we investigate the achievable data rate for non-orthogonal multiple access (NOMA) with negatively-correlated information sources (CIS). For this, based on the linear transformation of independent random variables (RV), we derive the closed-form expressions for the achievable data rates of NOMA with negatively-CIS. Then it is shown that the achievable data rate of the negatively-CIS NOMA increases for the stronger channel user, whereas the achievable data rate of the negatively-CIS NOMA decreases for the weaker channel user, compared to that of the positively-CIS NOMA for the stronger or weaker channel users, respectively. We also show that the sum rate of the negatively-CIS NOMA is larger than that of the positively-CIS NOMA. As a result, the negatively-CIS could be more efficient than the positively-CIS, when we transmit CIS over 5G NOMA networks.

Physical Layer Security for Two-Way Relay NOMA Systems with Energy Harvesting

  • Li, Hui;Chen, Yaping;Zou, Borong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2094-2114
    • /
    • 2022
  • Due to the wide application of fifth generation communication, wireless sensor networks have become an indispensable part in our daily life. In this paper, we analyze physical layer security for two-way relay with energy harvesting (EH), where power splitter is considered at relay. And two kinds of combined methods, i.e., selection combining (SC) and maximum ratio combining (MRC) schemes, are employed at eavesdropper. What's more, the closed-form expressions for security performance are derived. For comparison purposes, this security behaviors for orthogonal multiple access (OMA) networks are also investigated. To gain deeper insights, the end-to-end throughput and approximate derivations of secrecy outage probability (SOP) under the high signal-to-noise ratio (SNR) regime are studied. Practical Monte-Carlo simulative results verify the numerical analysis and indicate that: i) The secure performance of SC scheme is superior to MRC scheme because of being applied on eavesdropper; ii) The secure behaviors can be affected by various parameters like power allocation coefficients, transmission rate, etc; iii) In the low and medium SNR region, the security and channel capacity are higher for cooperative non-orthogonal multiple access (NOMA) systems in contrast with OMA systems; iv) The systematic throughput can be improved by changing the energy conversion efficiency and power splitting factor. The purpose of this study is to provide theoretical direction and design of secure communication.

Performance analysis of SWIPT-assisted adaptive NOMA/OMA system with hardware impairments and imperfect CSI

  • Jing Guo;Jin Lu;Xianghui Wang;Lili Zhou
    • ETRI Journal
    • /
    • v.45 no.2
    • /
    • pp.254-266
    • /
    • 2023
  • This paper investigates the effect of hardware impairments (HIs) and imperfect channel state information (ICSI) on a SWIPT-assisted adaptive nonorthogonal multiple access (NOMA)/orthogonal multiple access (OMA) system over independent and nonidentical Rayleigh fading channels. In the NOMA mode, the energy-constrained near users act as a relay to improve the performance for the far users. The OMA transmission mode is adopted to avoid a complete outage when NOMA is infeasible. The best user selection scheme is considered to maximize the energy harvested and avoid error propagation. To characterize the performance of the proposed systems, closed-form and asymptotic expressions of the outage probability for both near and far users are studied. Moreover, exact and approximate expressions of the ergodic rate for near and far users are investigated. Simulation results are provided to verify our theoretical analysis and confirm the superiority of the proposed NOMA/OMA scheme in comparison with the conventional NOMA and OMA protocol with/without HIs and ICSI.

A Cognitive Beamforming Scheme for Cross-Tier Interference Mitigation in Heterogeneous Cellular Networks (이종 셀룰러 망에서 계층 간 간섭완화를 위한 인지 빔형성 기법)

  • Seo, Ju-yeol;Park, Seungyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1387-1401
    • /
    • 2016
  • When a closed access policy in which only an authorized user is allowed to access to a given base station (BS) has been employed in heterogeneous cellular networks, a macro-cell user is used to experience strong cross-tier interference from its adjacent small-cell BSs to which the user is not allowed to access. To mitigate this problem, it has been proposed that a small-cell BS employs a beamforming vector which is orthogonal to the channel of the victim user. However, this technique requires considerable mutual exchange of information among the macro-cell BS, the macro-cell user, and the small-cell BS. In this paper, we propose a cognitive beamforming scheme, in which a small-cell BS employs the beamforming orthogonal to the victim users' channel without any explicit mutual information exchange. Particularly, the small-cell BS finds small- and macro-cell users experiencing the co-tier and cross-tier interferences from it, respectively. Then, it employs a beamforming which is orthogonal to the victim users' channels to mitigate the co-tier and cross-tier interferences. Using the system-level simulation, we demonstrate that the proposed scheme effectively mitigates the cross-tier interference problem.

Performance of Cooperative NOMA Systems with Cognitive User Relay (상황인지 사용자 릴레이를 채택한 협동 NOMA 시스템의 성능)

  • Kim, Nam-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.69-75
    • /
    • 2018
  • Recently, Non-orthogonal multiple access (NOMA) has been focused for the next generation multiple access, which has more spectral efficiency under the limited spectrum bandwidth. Moreover, the spectrum efficiency can be improved by cognitive radio in which the unlicensed secondary users can access the spectrum that is used by the licensed primary user under the limited interference. Hence, we consider the combination of NOMA and cognitive radio, and derive the performance of the cognitive cooperative NOMA system. For the cooperation, a relay is selected among near users, and the selection combining is assumed at a far user. The outage probability of the selected relay and the far user is derived in closed-form, respectively. The provided numerical results are matched well with the Monte Carlo simulation. Numerical results showed that the performance of the relay is affected from the power allocation coefficient, the minimum outage probability is observed at 0.86 of the power allocation coefficient for far user under the given conditions. More than 15 dB of signal-to-noise ratio is required to meet the outage probability of $1{\times}10^{-13}$ for the far user with the frequency acquisition probability of 0.5 compared to that of 1. It shows that the performance of the far user is very sensitive to the acquisition probability of the cognitive relay.

A Simple Open Loop Transmit Diversity Scheme for Rician Fading Channels (라이시안 페이딩 채널을 위한 단순한 형태의 개방루프 전송 다이버시티 기법)

  • 김학성;이원철;신요안
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.7B
    • /
    • pp.695-705
    • /
    • 2002
  • In this paper, we propose a simple open loop transmit diversity (TD) scheme for the wideband code division multiple access (W-CDMA) systems in Rician multipath fading channels such as rural area or satellite channels where line-of-sight (LOS) paths are in presence. The proposed scheme does not require any pre-processing of transmit data, resulting in simpler structure as compared to conventional closed loop transmit adaptive array (TxAA) and open loop space-time transmit diversity (STTD). We analytically derive the probability density function of signal-to-noise ratio at the Rake receiver output and the uncoded bit error rate performance of the proposed scheme. Extensive simulation is Performed to verify the analytical performance of the proposed scheme under typical Rician multipath fading channel environments. Moreover, comparative results with the conventional TxAA and STTD are also provided. Simulation results show that the proposed scheme shows slightly better performance than the conventional open loop STTD under the channels with very weak LOS components, however, it significantly outperforms the STTD under the channels with dominant LOS components, and achieves a close performance of ideal closed loop TxAA.

The Management and Security Plans of a Separated Virtualization Infringement Type Learning Database Using VM (Virtual Machine) (VM(Virtual Machine) 을 이용한 분리된 가상화 침해유형 학습 데이터베이스 관리와 보안방안)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.947-953
    • /
    • 2011
  • These days, a consistent and fatal attack attribute toward a database has proportionally evolved in the similar development form to that of security policy. Because of access control-based defensive techniques regarding information created in closed networks and attacks on a limited access pathway, cases of infringement of many systems and databases based on accumulated and learned attack patterns from the past are increasing. Therefore, the paper aims to separate attack information by its types based on a virtual infringement pattern system loaded with dualistic VM in order to ensure stability to limited certification and authority to access, to propose a system that blocks infringement through the intensive management of infringement pattern concerning attack networks, and to improve the mechanism for implementing a test that defends the final database, the optimal defensive techniques, and the security policies, through research.

Systematizing Information Use to Address Determinants of Health Worker Health in South Africa: A Cross-sectional Mixed Method Study

  • Muzimkhulu Zungu;Annalee Yassi ;Jonathan Ramodike;Kuku Voyi;Karen Lockhart;David Jones;Spo Kgalamono;Nkululeko Thunzi;Jerry Spiegel
    • Safety and Health at Work
    • /
    • v.14 no.4
    • /
    • pp.368-374
    • /
    • 2023
  • Background: Recognizing that access to safe and healthy working conditions is a human right, the World Health Organization (WHO) calls for specific occupational safety and health (OSH) programs for health workers (HWs). The WHO health systems' building blocks, and the International Labour Organization (ILO), highlight the importance of information as part of effective systems. This study examined how OSH stakeholders access, use, and value an occupational health information system (OHIS). Methods: A cross-sectional survey of OSH stakeholders was conducted as part of a larger quasi experimental study in four teaching hospitals. The study hospitals and participants were purposefully selected and data collected using a modified questionnaire with both closed and open-ended questions. Quantitative analysis was conducted and themes identified for qualitative analysis. Ethics approval was provided by the University of Pretoria and University of British Columbia. Results: There were 71 participants comprised of hospital managers, health and safety representatives, trade unions representatives and OSH professionals. At least 42% reported poor accessibility and poor timeliness of OHIS for decision-making. Only 50% had access to computers and 27% reported poor computer skills. When existing, OHIS was poorly organized and needed upgrades, with 85% reporting the need for significant reforms. Only 45% reported use of OHIS for decision-making in their OSH role. Conclusion: Given the gap in access and utilization of information needed to protect worker's rights to a safe and healthy workplace, more attention is warranted to OHIS development and use as well as education and training in South Africa and beyond.

Effect Investigation of a GP for Asynchronous MC-CDMA Systems (비동기 MC-CDMA 시스템에 대한 보호구간의 영향 분석)

  • Ko, Kyun-Byoung;Hong, Dae-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.11C
    • /
    • pp.851-859
    • /
    • 2008
  • This paper investigates the effect a guard period (GP) in the form of a cyclic prefix for asynchronous multicarrier-code division multiple access (MC-CDMA) systems. At first, we analyze the performance of asynchronous MC-CDMA systems with a GP, which results in closed-form bit error rate (BER) performance. Furthermore, it confirms that the frequency diversity of MC-CDMA systems is identical to the path diversity. The analytical approach proposed here is extended to the case without a GP. The derived analytical results show that a GP is required for MC-CDMA systems in order to mitigate not only the effect of intersymbol interference (ISI) and intercarrier interference (ICI) but also the desired signal power degradation. In addition, the accuracy of the proposed analysis is verified by simulations.