In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Bandwidth-Performance Tradeoffs for a Transmission with Concurrent Signals
This document analyzes the performance tradeoffs of transmitting two signals concurrently over the same bandwidth. It derives expressions for the minimum distances of the signals' constellations at the receivers and the bit error rate (BER) as a function of the signals' energies and probability distributions. The analysis shows that transmitting signals concurrently reduces performance compared to separate transmission, with the reduction increasing as the signals' energies become more similar. Concurrent transmission also requires more total energy to achieve a given minimum distance compared to separate transmission.
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
The rapid growth of bandwidth demanding wireless technologies has led to the problem of spectrum scarcity. However, studies show that licensed spectrum is underutilized. Cognitive radio technology promises a solution to the problem by allowing unlicensed users, access to the licensed bands opportunistically. A prime component of the cognitive radio technology is spectrum sensing. Many spectrum sensing techniques have been developed to sense the presence or not of a licensed user. This paper evaluates the performance of the energy detection based spectrum sensing technique in noisy, fading, jamming, interference environments. Both single user detection and cooperative detection situations were investigated. Closed form solutions for the probabilities of detection and false alarm were derived. The analytical results were varied by numerical computations using Monte Carlo method with MATLAB. The performance of the computationally efficient energy detection (CE-ED) techniques were evaluated by use of Receiver Operating Characteristics (ROC) curves over additive white Gaussian noise (AWGN) and fading (Rayleigh & Nakagami-m) channels. Results show that for single user detection, the energy detection technique performs better in AWGN channel than in the fading channel models. The performance of cooperative detection is better than single user detection in fading environments.
11.design and implementation of distributed space frequency to achieve cooper...
This document summarizes a research paper that proposes a distributed space-frequency coding scheme to achieve cooperative diversity in wireless relay networks. The key points are:
1) The scheme aims to overcome limitations of conventional correlation receivers and achieve full diversity with maximum coding gain over MIMO channels.
2) It considers diversity from source coding, channel coding, and user cooperation. The proposed space-time coded communication scheme is shown to be bandwidth and power efficient.
3) Performance is analyzed over fading channels using a maximum likelihood decision metric with channel estimation errors. Performance in slowly changing Rayleigh channels is also presented.
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...
Many network simulators (e.g., ns2) are already
being used for performing wired and wireless network
simulations. But, with the current graphical visualization
support in-built in ns2, it is difficult to understand the node
status, packet status and the MAC level events particularly
for Ad-hoc networks. In this paper, we extend the visualization
support in ns-2 that should help research community in the
area of wireless networks to analyze different MAC level
events in an efficient manner. In particular, we have developed
two types of visualizations namely, temporal and spatial.
Temporal visualization helps to analyze success or failure of
a packet with respect to time while spatial visualization helps
to understand the effects due to proximity of nodes. The trace
is made highly configurable in terms of different attributes
like specific nodes and time duration.
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
In this paper Identity based digital Signature and Identity based online offline algorithm for the cluster based wireless sensor networks is used. Identity based digital signature computes the digital signature signing process. Identity based online offline algorithm reduces the complexity of computational overhead in cluster head. This project reduces the overhead of the cluster head for efficient transmission. The method for efficient data transmission using Identity based digital signature is also implemented for minimizing end-to-end delay using network simulator. The graphics analysis toolbox and awk scripts is used to process the data from trace files.
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
This document discusses improving bit error rate (BER) performance in orthogonal frequency division multiplexing (OFDM) systems using hybrid low-density parity check (LDPC) codes and space-time block coding (STBC). It first describes MMSE and LS channel estimation techniques in OFDM and an adaptive modulation and coding WiMAX system. It then proposes using LDPC codes with STBC across multiple transmit antennas to achieve coding gain and diversity gain. Simulation results show the hybrid LDPC-STBC method provides better BER performance than STBC alone, especially at low signal-to-noise ratios in flat Rayleigh fading channels.
This document analyzes the performance of energy detection algorithms for spectrum sensing in cognitive radio systems. It discusses how energy detection works by formulating the spectrum sensing problem as a binary hypothesis test to determine if a primary user is present or absent. It finds that increasing the signal-to-noise ratio, sample size, or dynamic detection threshold can improve detection performance. However, it also notes that energy detection is very sensitive to noise uncertainty, which can seriously degrade performance, especially in low signal-to-noise environments. A dynamic thresholding approach is proposed to improve robustness to noise uncertainty.
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...optljjournal
Recently, indoor Optical Wireless (OW) connectivity has gained significant attention as a possible
alternative to tackle the problem of bottleneck access and as an improvement to ever more conventional RF
/ microwave connections. In indoor OW communication, OOK encoding is more widely used owing to its
effective usage of bandwidth and robustness to timing errors, given the fact that the power consumption is
less than PPM. The modulation format in this research work is Q-array PPM over lasers, with modulation
of power. The effects of the analysis are analyzed numerically in view of the amount of bit error (BER). It is
shown that, because of coding for 4PPM framework, the bit error performance is increased. For instance,
an LDPC-coded device with stable foundation radiation provides a important coding improvement of 5 to 6
dB over uncoded device at BER in the order of 10-8 and 10-12 respectively.
Data detection with a progressive parallel ici canceller in mimo ofdmeSAT Publishing House
The document describes a progressive parallel interference canceller (PPIC) for use in a MIMO-OFDM system to suppress inter-carrier interference (ICI). PPIC is compared to parallel interference canceller (PIC) and shows lower complexity and better performance. PPIC architecture is simpler than PIC and more suitable for implementation in wireless communication systems requiring high data rates and mobility. Simulation results show that PPIC combined with LDPC coding achieves lower bit error rates than PIC combined with LDPC coding.
Bandwidth-Performance Tradeoffs for a Transmission with Concurrent Signalscsandit
This document analyzes the performance tradeoffs of transmitting two signals concurrently over the same bandwidth. It derives expressions for the minimum distances of the signals' constellations at the receivers and the bit error rate (BER) as a function of the signals' energies and probability distributions. The analysis shows that transmitting signals concurrently reduces performance compared to separate transmission, with the reduction increasing as the signals' energies become more similar. Concurrent transmission also requires more total energy to achieve a given minimum distance compared to separate transmission.
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...IJRST Journal
The rapid growth of bandwidth demanding wireless technologies has led to the problem of spectrum scarcity. However, studies show that licensed spectrum is underutilized. Cognitive radio technology promises a solution to the problem by allowing unlicensed users, access to the licensed bands opportunistically. A prime component of the cognitive radio technology is spectrum sensing. Many spectrum sensing techniques have been developed to sense the presence or not of a licensed user. This paper evaluates the performance of the energy detection based spectrum sensing technique in noisy, fading, jamming, interference environments. Both single user detection and cooperative detection situations were investigated. Closed form solutions for the probabilities of detection and false alarm were derived. The analytical results were varied by numerical computations using Monte Carlo method with MATLAB. The performance of the computationally efficient energy detection (CE-ED) techniques were evaluated by use of Receiver Operating Characteristics (ROC) curves over additive white Gaussian noise (AWGN) and fading (Rayleigh & Nakagami-m) channels. Results show that for single user detection, the energy detection technique performs better in AWGN channel than in the fading channel models. The performance of cooperative detection is better than single user detection in fading environments.
11.design and implementation of distributed space frequency to achieve cooper...Alexander Decker
This document summarizes a research paper that proposes a distributed space-frequency coding scheme to achieve cooperative diversity in wireless relay networks. The key points are:
1) The scheme aims to overcome limitations of conventional correlation receivers and achieve full diversity with maximum coding gain over MIMO channels.
2) It considers diversity from source coding, channel coding, and user cooperation. The proposed space-time coded communication scheme is shown to be bandwidth and power efficient.
3) Performance is analyzed over fading channels using a maximum likelihood decision metric with channel estimation errors. Performance in slowly changing Rayleigh channels is also presented.
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...idescitation
Many network simulators (e.g., ns2) are already
being used for performing wired and wireless network
simulations. But, with the current graphical visualization
support in-built in ns2, it is difficult to understand the node
status, packet status and the MAC level events particularly
for Ad-hoc networks. In this paper, we extend the visualization
support in ns-2 that should help research community in the
area of wireless networks to analyze different MAC level
events in an efficient manner. In particular, we have developed
two types of visualizations namely, temporal and spatial.
Temporal visualization helps to analyze success or failure of
a packet with respect to time while spatial visualization helps
to understand the effects due to proximity of nodes. The trace
is made highly configurable in terms of different attributes
like specific nodes and time duration.
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...IJTET Journal
In this paper Identity based digital Signature and Identity based online offline algorithm for the cluster based wireless sensor networks is used. Identity based digital signature computes the digital signature signing process. Identity based online offline algorithm reduces the complexity of computational overhead in cluster head. This project reduces the overhead of the cluster head for efficient transmission. The method for efficient data transmission using Identity based digital signature is also implemented for minimizing end-to-end delay using network simulator. The graphics analysis toolbox and awk scripts is used to process the data from trace files.
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmIAEME Publication
This document discusses improving bit error rate (BER) performance in orthogonal frequency division multiplexing (OFDM) systems using hybrid low-density parity check (LDPC) codes and space-time block coding (STBC). It first describes MMSE and LS channel estimation techniques in OFDM and an adaptive modulation and coding WiMAX system. It then proposes using LDPC codes with STBC across multiple transmit antennas to achieve coding gain and diversity gain. Simulation results show the hybrid LDPC-STBC method provides better BER performance than STBC alone, especially at low signal-to-noise ratios in flat Rayleigh fading channels.
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...ijcnac
The wideband code division multiple access (WCDMA) based 3G cellular mobile
wireless networks are expected to provide a diverse range of multimedia services to
mobile users with guaranteed quality of service (QoS). To serve diverse quality of service
requirements of these networks it necessitates new radio resource management strategies
for effective utilization of network resources with coding schemes. In this paper coverage
area for voice traffic and with different modulation techniques, coding schemes and
decision decoder are discussed. These discussions are to improve the coverage area in
the mobile communication system. This paper is mainly focuses on coverage area of
WCDMA system using link budget calculation with different modulation, coding schemes
and decision decoder. Simulation results demonstrate coverage extension for voice
service with different modulation,coding scheme, soft and hard decision decoder using
appropriate Bit error rate (BER) to maintain QoS of the voice.
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
In this paper, we have taken out the concern of security on a Medium Access Control layer
implementing Assured Neighbor based Security Protocol to provide the authentication,
confidentiality and taking in consideration High speed transmission by providing security in
parallel manner in both Routing and Link Layer of Mobile Ad hoc Networks. We basically
divide the protocol into two different segments as the first portion concentrates, based on
Routing layer information; we implement the scheme for the detection and isolation of the
malicious nodes. The trust counter for each node is maintained which actively increased and
decreased considering the trust value for the packet forwarding. The threshold level is defined differencing the malicious and non malicious nodes. If the value of the node in trust counter lacks below the threshold value then the node is considered as malicious. The second part focus on providing the security in the link layer, the security is provided using CTR (Counter) approach for authentication and encryption. Hence simulating the results in NS-2, we come to conclude that the proposed protocol can attain high packet delivery over various intruders while attaining low delays and overheads.
The document discusses reducing interference in cellular networks. It describes that frequency division duplexing (FDD) and time division duplexing (TDD) are the main duplexing technologies used, but both have interference issues. It then introduces code division duplexing (CDD) which combines CDMA with a new set of "smart codes" applied to a TDD system. This allows a TDD system to eliminate all interference types. CDD is presented as a promising new 3G technology that simplifies network design and lowers costs by transitioning cellular networks from interference-limited to noise-limited environments.
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
Sensor network facilitates monitoring and controlling of physical environments. These wireless networks consist of dense collection of sensors capable of collection and dissemination of data. They have application in variety of fields such as military purposes, environment monitoring etc. Typical deployment of sensor network assumes central processing station or a gateway to which all other nodes route their data using dynamic source routing (DSR). This causes congestion at central station and thus reduces the efficiency of the network. In this work we will propose a better dynamic source routing technique using network coding to reduce total number of transmission in sensor networks resulting in better efficiency.
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksTELKOMNIKA JOURNAL
1) The document compares the secrecy probability performance of amplify-and-forward non-orthogonal multiple access (AF-NOMA) networks and amplify-and-forward orthogonal multiple access (AF-OMA) networks in the presence of an eavesdropper.
2) It derives an upper bound expression for the strictly positive secrecy capacity (SPSC) of the AF-NOMA network, which represents the probability that the instantaneous secrecy rates are positive.
3) The analysis shows that the SPSC of NOMA is significantly lower than OMA due to the channel characterization of NOMA, but it can be improved by optimizing the power allocation coefficients.
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...TELKOMNIKA JOURNAL
This paper shows a new technic applicable for the digital devices that are the result of the finite’s
effect precision in the chaotic dynamics used in the coupled technic and the chaotic map’s perturbation
technics used for the generation of a Pseudo-Random Number Generator (PRNGs).The use of the
pseudo- chaotic sequences coupled to the orbit perturbation method in the chaotic logistic map and the
NewPiece-Wise Linear Chaotic Map (NPWLCM). The pseudo random number generator’s originality
proposed from the perturbation of the chaotic recurrence. Furthermore the outputs of the binary sequences
with NPWLCM are reconstructed conventionally with the Bernoulli’s sequences shifts map to change the
shapes with the bitwise permetation then the results in simulation are shown in progress.After being
perturbed, the chaotic system can generate the chaotic binary sequences in uniform distribution and the
statistical properties invulnerable analysis. This generator also has many advantages in the possible useful
applications of spread spectrum digitalimages, such as sensitive secret keys, random uniform distribution
of pixels in Crypto system in secure and synchronize communication.
Optimization of Cmos 0.18 µM Low Noise Amplifier Using Nsga-Ii for UWB Applic...VLSICS Design
A design and optimization of 3-5 GHz single ended Radio Frequency (RF) Low Noise Amplifier (LNA) for
ultra-wide-band (UWB) applications using standard UMC 0.18 μm CMOS technology is reported.
Designing of RF circuit components is a challenging job, since even after performing lengthy calculations
and finding parameter values it is less guarantee that the design performs as expected. In view of this the
optimization tool; Elitist Non-Dominated Sorting Genetic Algorithm (NSGA-II); has been employed to get
the optimized starting values of components in the proposed LNA design. The obtained NSGA-II
parameters were simulated using Cadence Spectre- RF simulator. The designed Low Noise Amplifier
achieves a power gain of 22 dB and a minimum Noise Figure of 3 dB is achieved. It dissipates 12.5 mW of
power out of 1.8 V supply.
This document analyzes the RC4 encryption algorithm and examines how its performance is affected by changing parameters like encryption key length and file size. Experimental tests were conducted to measure encryption time for different key lengths and file types. The results show encryption time increases with longer keys and larger files, and are modeled mathematically. The document also provides background on encryption methods, how RC4 works, and compares stream and block ciphers.
1. The document presents an audio watermarking algorithm based on discrete wavelet transform and least significant bit insertion (DWT-LSB). The DWT decomposes the audio signal into sub-bands to identify locations for embedding watermark bits. The watermark bits are embedded in the high-resolution sub-band using LSB insertion.
2. Testing showed SNR values between 53.7-59.6 dB for different audio signals, indicating imperceptibility of the embedded watermark. The DWT-LSB method provides satisfactory robustness and imperceptibility for audio watermarking.
3. Digital watermarking techniques like the one proposed can help protect copyright of digital audio by embedding invisible signatures as
A method to determine partial weight enumerator for linear block codesAlexander Decker
This document presents a method to determine partial weight enumerators for linear block codes using error impulse technique and Monte Carlo method. The partial weight enumerator can be used to compute an upper bound on the error probability of maximum likelihood decoding. As an application, the method provides partial weight enumerators and performance analyses of three shortened BCH codes: BCH(130,66), BCH(103,47), and BCH(111,55). The full weight distributions of these codes are unknown.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
In this paper, we design a secure transmission scheme in uplink and downlink of nonorthogonal
multiple access (NOMA) system. In this scenario, two pairs of base stationuser can operate under the presence of eavesdropper. The relay plays an important role to forward signals from group of base stations to serve distant users. However, the eavesdropper can overhear signal which leads to secure performance need be reconsidered. To provide secure performance, we derive the closed-form expressions for strictly positive secrecy capacity (SPSC). In addition, we rely on relay for enlarge coverage area. The channel conditions meet imperfect channel state information (CSI) which shows degraded secure performance. Results confirm the relationship between transmit power at the source and and SPSC how many main parameters affecting secure
performance metric. Furthermore, simulation results show that the uplink and downlink NOMA technique improves secure performance in the low SPSC region. We further conduct analysis by using Monte-Carlo simulations.
Security performance analysis for power domain NOMA employing in cognitive ra...journalBEEI
The power domain non-orthogonal multiple access (NOMA) technique introduces one of the fundamental characteristics and it exhibits the possibility of users to decode the messages of the other paired users on the same resources. In cognitive radio inspired NOMA (CR-NOMA), the base station (BS) has to serve untrusted users or users with different security clearance. This phenomenon raises a security threat particularly in such CR-NOMA. This paper develops a tractable analysis framework to evaluate the security performance of cooperative non-orthogonal multiple access (NOMA) in cognitive networks, where relay is able to serve two far NOMA users in the presence of external eavesdropper. In particular, we study the secrecy outage probability in a two-user NOMA system. This situation happens in practical the BS is pairing a legitimate user with another untrusted user. Main reason is that the non-uniform distribution in terms of trusted and untrusted users in the cell. By performing numerical results demonstrate the performance improvements of the proposed NOMA scheme in comparison to that of several situations in terms of different parameters. Furthermore, the security performance of NOMA is shown to verify the derived expressions.
Study on outage performance gap of two destinations on CR-NOMA networkTELKOMNIKA JOURNAL
This document studies the outage performance of two secondary destinations in a cognitive radio non-orthogonal multiple access (CR-NOMA) network. It presents a system model of a downlink dual-hop CR-NOMA network consisting of a primary destination, secondary source, relay, and two secondary destinations. It derives the exact outage probability expressions for the secondary users by obtaining the signal-to-interference-plus noise ratio and signal-to-noise ratio for each transmission. The results show that the performance gap between the two secondary users can be obtained due to different power allocation factors assigned to each user.
Performance enhancement of wireless sensor network by using non-orthogonal mu...nooriasukmaningtyas
In this paper, we investigate a relaying wireless sensor network (WSN) with
the non-orthogonal multiple access (NOMA) and sensor node selection
schemes over rayleigh fading. Precisely, the system consists of two sensor
clusters, a sink node, and an amplify-and-forward (AF) relay. These sensors
applying the NOMA and sensor node selection schemes transmit the sensing
data from the sensor clusters via the relay to the sink. We derived the
expressions of outage probability and throughput for two sensor nodes. We
also provide numerical results to examine the behavior of the system. Finally,
we verify the validity of our analysis by using the monte-carlo simulation.
Employing non-orthogonal multiple access scheme in UAV-based wireless networksjournalBEEI
This paper studies the two-hop transmission relying unmanned aerial vehicle (UAV) relays which is suitable to implement in the internet of things (IoT) systems. To enhance system performance in order to overcome the large scale fading between the base station (BS) and destination as well as achieve the higher spectrum efficiency, where non-orthogonal multiple access (NOMA) strategies were typically applied for UAV relays to implement massive connections transmission. In particular, outage probability is evaluated via signal to noise ratio (SNR) criterion so that the terminal node can obtain reasonable performance. The derivations and analysis results showed that the considered fixed power allocation scheme provides performance gap among two signals at destination.The numerical simulation confirmed the exactness of derived expressions in the UAV assisted system.
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...journalBEEI
Non-orthogonal multiple access (NOMA) with advantages such as superior spectral efficiency has been considered as a promising multiple access technique for the fifth-generation (5G) mobile networks. In this research, we propose energy harvesting (EH) NOMA system relaying network over Rayleigh fading channel using selection combining at the receiver. Firstly, we investigate the system performance in terms of the closed-form expression of the outage probability (OP). Here we compare the OP of two destination users of the proposed system. Finally, all the results is convinced by the Monte Carlo simulation. From the results, we can confirm that all the analytical and simulation results are the same in connection with the primary system parameters.
Secure outage probability of cognitive radio network relying non-orthogonal m...journalBEEI
This paper studies the secondary network relying relay selection to transmit signal from the secondary source (base station) to two destinations. Especially, two destinations are required non-orthogonal multiple access (NOMA) scheme and it benefits to implementation of the Internet of Things (IoT) systems. However, eavesdropper over-hears signal related link from selected relay to destination. This paper measure secure performance via metric, namely secure outage probability (SOP). In particular, signal to noise ratio (SNR) criterion is used to evalute SOP to provide reliable transmission to the terminal node. Main results indicates that the considered scheme provides performance gap among two signals at destination. The exactness of derived expressions is confirmed via numerical simulation.
Tractable computation in outage performance analysis of relay selection NOMATELKOMNIKA JOURNAL
In recent years, using full-duplex (FD) transmission model provides enhanced bandwidth efficiency and improved performance for non-orthogonal multiple access (NOMA) system. However, lack of papers have investigated FD relay together with relay selection issue to improve performance of NOMA system. The problems in power allocation for two NOMA users satisfying fairness as well as relay selection strategy are studied in this paper. By considering the outage performance of proposed scheme with its vital result, general NOMA wireless networks can be developed for future networks due to its improved performance. Simulation results show that the relaying selection scheme can achieve a significant performance improvement by increasing required quantity of relay.
Enabling relay selection in non-orthogonal multiple access networks: direct a...TELKOMNIKA JOURNAL
In this paper, we consider downlink non-orthogonal multiple access (NOMA) in which the relay selection (RS) scheme is enabled for cooperative networks. In particular, we investigate impact of the number of relays on system performance in term of outage probability. The main factors affecting on cooperative NOMA performance are fixed power allocations coefficients and the number of relay. This paper also indicate performance gap of the outage probabilities among two users the context of NOMA. To exhibit the exactness of derived formula, we match related results between simulation and analytical methods. Numerical results confirms that cooperative NOMA networks benefit from increasing the number of relay.
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...TELKOMNIKA JOURNAL
In the future wireless systems, non-orthogonal multiple-access (NOMA) with partial relay selection scheme is considered as developing research topic. In this paper, dual-hop relaying systems is deployed for NOMA, in which the signals are communicated with the assistance of decode-and-forward (DF) scheme. This paper presents exact expressions for outage probability over independent Rayleigh fading channels, and two partial relay selection schemes are provided. Using analytical result and Monte-Carlo method, we introduce forwarding strategy selection for fixed user allocation and exactness of derived formula is checked. The presented simulations confirm the the advantage of such proposed NOMA, and the effectiveness of the proposed forwarding strategy.
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMATELKOMNIKA JOURNAL
In this paper, new radio access scheme that combines Amplify-and-Forward (AF) relaying protocol and non-orthogonal multiple access (NOMA) system is introduced. In particular, different scenarios for fixed power allocation scheme is investigated. In addition, the outage probability of both weak and strong user is derived and provided in closed-form expressions. Such outage is investigated in high SNR scenario and comparison performance between these NOMA scenarios is introduced. Numerical simulations are offered to clarify the outage performance of the considered scheme if varying several parameters in the existing schemes to verify the derived formulas.
Physical security layer with friendly jammer in half-duplex relaying networks...journalBEEI
In this research, thephysical security layer with a friendly jammerin half-duplex (HD) relaying networksover the Rayleigh fading channel is proposed and investigated. Firstly, we proposed the system model and the time switching,power splitting protocolsfor the system model. Then we conductedthe mathematical analysisfor deriving the exact analysis and asymptotic analysisintegral forms for intercept probability (IP). Finally, the analytical formulationis verified by the Monte Carlo simulation with all main system parameters. From the results, we can show that the simulation and analytical values are the same values.
Enabling full-duplex in multiple access technique for 5G wireless networks ov...TELKOMNIKA JOURNAL
This document analyzes the performance of a two-user non-orthogonal multiple access (NOMA) network where one user is served directly by the base station and the other is served via an unmanned aerial vehicle (UAV) relay operating in full-duplex mode. It derives the exact outage probabilities of the two users under Rician fading channels. The analysis provides guidelines for designing UAV-enabled wireless networks using NOMA techniques. Key results include the outage probabilities accounting for interference at both the UAV relay and users under different self-interference conditions at the relay.
The document proposes a new system for quantum cryptography network communication using optical tweezers generated via a nonlinear modified add/drop interferometer. Dark solitons and Gaussian pulses are introduced to generate multiple optical potential wells representing secured binary codes. These coded potential wells can be transmitted through different time slots in a time division multiple access system for high-capacity secure data transmission. Narrow output pulses of 9.57 nm and 8 nm were obtained from the drop and through ports, which were then combined and used to generate multiplexed potential well signals with 0.8 nm width and 5 nm frequency spacing for transmitting digital codes to network users via different fiber lengths.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Outage and throughput performance of cognitive radio based power domain based...TELKOMNIKA JOURNAL
This paper considers power domain based multiple access (PDMA) in cognitive radio network to serve numerous users who intend to multiple access to core network. In particular, we investigate the effect of signal combination scheme equipped at PDMA end-users as existence of direct link and relay link. This system model using relay scheme provides performance improvement on the outage probability of two PDMA end-users. We first propose a simple scheme of fixed power allocation to PDMA users who exhibit performance gap and fairness. Inspired by PDMA strategy, we then find signal to noise ratio (SNR) to detect separated signal for each user. In addition, the exact expressions of outage probability are derived in assumption that receiver can cancel out the interference completely with successive interference cancellation (SIC). By exploiting theoretical and simulation results, both considered combination schemes (Maximal Ratio Combining (MRC) and Selection Combining (SC) can achieve improved performance of two PDMA users significantly.
A new look on CSI imperfection in downlink NOMA systemsjournalBEEI
- The document analyzes the performance of downlink non-orthogonal multiple access (NOMA) systems under imperfect channel state information (CSI) and Nakagami-m fading.
- It derives closed-form expressions for the outage probability of two users in such NOMA systems considering the joint impact of imperfect CSI and Nakagami-m fading.
- Monte Carlo simulations are conducted to verify the accuracy of the analytical outage probability expressions derived for the two users under the system and channel models considered.
A low complexity distributed differential scheme based on orthogonal space t...IJECEIAES
The document presents a new low complexity distributed differential scheme for decode-and-forward wireless relay networks. The proposed scheme uses orthogonal space time block coding and does not require channel state information or differential encoding. It achieves high data rates with low decoding complexity at the source, relay, and destination nodes. Computer simulations show the proposed differential technique outperforms reference strategies and enjoys low encoding and decoding complexity while providing full transmission rate.
Outage performance users located outside D2D coverage area in downlink cellul...journalBEEI
Device-to-device (D2D) communication has been proposed to employ the proximity between two devices to enhance the overall spectrum utilization of a crowded cellular network. With the help of geometric probability tools, this framework considers the performance of cellular users under spatial separation with the D2D pair is investigated. The measurement results and analytical expression of outage probability show that the proposed frameworks improve the outage performance at a high signal-tonoise ratio (SNR) at the base station. Results also interpret that the distances between nodes in the D2D-assisted network make slight impacts on the performance of the cellular user.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Similar to Exact secure outage probability performance of uplinkdownlink multiple access network under imperfect CSI (20)
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
The document proposes using a particle swarm optimization (PSO) algorithm to optimize the hyperparameters of a convolutional neural network (CNN) for image classification. The PSO algorithm is used to find optimal values for CNN hyperparameters like the number and size of convolutional filters. In experiments on the MNIST handwritten digit dataset, the optimized CNN achieved a testing error rate of 0.87%, which is competitive with state-of-the-art models. The proposed approach finds optimized CNN architectures automatically without requiring manual design or encoding strategies during training.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
This document describes the implementation of a double-layer structure on an octagon microstrip yagi antenna (OMYA) to improve its performance at 5.8 GHz. The double-layer consists of two double positive (DPS) substrates placed above the OMYA. Simulation and experimental results show that the double-layer configuration increases the gain of the OMYA by 2.5 dB compared to without the double-layer. The measured bandwidth of the OMYA with double-layer is 14.6%, indicating the double-layer can increase both the gain and bandwidth of the OMYA.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
The document provides an overview of the key performance indicators (KPIs) for 6G wireless networks compared to 5G networks. Some of the major KPIs discussed for 6G include: achieving data rates of up to 1 Tbps and individual user data rates up to 100 Gbps; reducing latency below 10 milliseconds; supporting up to 10 million connected devices per square kilometer; improving spectral efficiency by up to 100 times through technologies like terahertz communications and smart surfaces; and achieving an energy efficiency of 1 pico-joule per bit transmitted through techniques like wireless power transmission and energy harvesting. The document outlines how 6G aims to integrate terrestrial, aerial and maritime communications into a single network to provide ubiquitous connectivity with higher
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
A multi-task learning based hybrid prediction algorithm for privacy preservin...journalBEEI
There is ever increasing need to use computer vision devices to capture videos as part of many real-world applications. However, invading privacy of people is the cause of concern. There is need for protecting privacy of people while videos are used purposefully based on objective functions. One such use case is human activity recognition without disclosing human identity. In this paper, we proposed a multi-task learning based hybrid prediction algorithm (MTL-HPA) towards realising privacy preserving human activity recognition framework (PPHARF). It serves the purpose by recognizing human activities from videos while preserving identity of humans present in the multimedia object. Face of any person in the video is anonymized to preserve privacy while the actions of the person are exposed to get them extracted. Without losing utility of human activity recognition, anonymization is achieved. Humans and face detection methods file to reveal identity of the persons in video. We experimentally confirm with joint-annotated human motion data base (JHMDB) and daily action localization in YouTube (DALY) datasets that the framework recognises human activities and ensures non-disclosure of privacy information. Our approach is better than many traditional anonymization techniques such as noise adding, blurring, and masking.
Social media management system project report.pdfKamal Acharya
The project "Social Media Platform in Object-Oriented Modeling" aims to design
and model a robust and scalable social media platform using object-oriented
modeling principles. In the age of digital communication, social media platforms
have become indispensable for connecting people, sharing content, and fostering
online communities. However, their complex nature requires meticulous planning
and organization.This project addresses the challenge of creating a feature-rich and
user-friendly social media platform by applying key object-oriented modeling
concepts. It entails the identification and definition of essential objects such as
"User," "Post," "Comment," and "Notification," each encapsulating specific
attributes and behaviors. Relationships between these objects, such as friendships,
content interactions, and notifications, are meticulously established.The project
emphasizes encapsulation to maintain data integrity, inheritance for shared behaviors
among objects, and polymorphism for flexible content handling. Use case diagrams
depict user interactions, while sequence diagrams showcase the flow of interactions
during critical scenarios. Class diagrams provide an overarching view of the system's
architecture, including classes, attributes, and methods .By undertaking this project,
we aim to create a modular, maintainable, and user-centric social media platform that
adheres to best practices in object-oriented modeling. Such a platform will offer users
a seamless and secure online social experience while facilitating future enhancements
and adaptability to changing user needs.
Response & Safe AI at Summer School of AI at IIITHIIIT Hyderabad
Talk covering Guardrails , Jailbreak, What is an alignment problem? RLHF, EU AI Act, Machine & Graph unlearning, Bias, Inconsistency, Probing, Interpretability, Bias
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...YanKing2
Pre-trained Large Language Models (LLM) have achieved remarkable successes in several domains. However, code-oriented LLMs are often heavy in computational complexity, and quadratically with the length of the input code sequence. Toward simplifying the input program of an LLM, the state-of-the-art approach has the strategies to filter the input code tokens based on the attention scores given by the LLM. The decision to simplify the input program should not rely on the attention patterns of an LLM, as these patterns are influenced by both the model architecture and the pre-training dataset. Since the model and dataset are part of the solution domain, not the problem domain where the input program belongs, the outcome may differ when the model is trained on a different dataset. We propose SlimCode, a model-agnostic code simplification solution for LLMs that depends on the nature of input code tokens. As an empirical study on the LLMs including CodeBERT, CodeT5, and GPT-4 for two main tasks: code search and summarization. We reported that 1) the reduction ratio of code has a linear-like relation with the saving ratio on training time, 2) the impact of categorized tokens on code simplification can vary significantly, 3) the impact of categorized tokens on code simplification is task-specific but model-agnostic, and 4) the above findings hold for the paradigm–prompt engineering and interactive in-context learning and this study can save reduce the cost of invoking GPT-4 by 24%per API query. Importantly, SlimCode simplifies the input code with its greedy strategy and can obtain at most 133 times faster than the state-of-the-art technique with a significant improvement. This paper calls for a new direction on code-based, model-agnostic code simplification solutions to further empower LLMs.
Encontro anual da comunidade Splunk, onde discutimos todas as novidades apresentadas na conferência anual da Spunk, a .conf24 realizada em junho deste ano em Las Vegas.
Neste vídeo, trago os pontos chave do encontro, como:
- AI Assistant para uso junto com a SPL
- SPL2 para uso em Data Pipelines
- Ingest Processor
- Enterprise Security 8.0 (Maior atualização deste seu release)
- Federated Analytics
- Integração com Cisco XDR e Cisto Talos
- E muito mais.
Deixo ainda, alguns links com relatórios e conteúdo interessantes que podem ajudar no esclarecimento dos produtos e funções.
https://www.splunk.com/en_us/campaigns/the-hidden-costs-of-downtime.html
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-leading-observability-practice.pdf
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-modern-security-program.pdf
Nosso grupo oficial da Splunk:
https://usergroups.splunk.com/sao-paulo-splunk-user-group/
A vernier caliper is a precision instrument used to measure dimensions with high accuracy. It can measure internal and external dimensions, as well as depths.
Here is a detailed description of its parts and how to use it.
Software Engineering and Project Management - Introduction to Project ManagementPrakhyath Rai
Introduction to Project Management: Introduction, Project and Importance of Project Management, Contract Management, Activities Covered by Software Project Management, Plans, Methods and Methodologies, some ways of categorizing Software Projects, Stakeholders, Setting Objectives, Business Case, Project Success and Failure, Management and Management Control, Project Management life cycle, Traditional versus Modern Project Management Practices.
Unblocking The Main Thread - Solving ANRs and Frozen FramesSinan KOZAK
In the realm of Android development, the main thread is our stage, but too often, it becomes a battleground where performance issues arise, leading to ANRS, frozen frames, and sluggish Uls. As we strive for excellence in user experience, understanding and optimizing the main thread becomes essential to prevent these common perforrmance bottlenecks. We have strategies and best practices for keeping the main thread uncluttered. We'll examine the root causes of performance issues and techniques for monitoring and improving main thread health as wel as app performance. In this talk, participants will walk away with practical knowledge on enhancing app performance by mastering the main thread. We'll share proven approaches to eliminate real-life ANRS and frozen frames to build apps that deliver butter smooth experience.
Online music portal management system project report.pdfKamal Acharya
The iMMS is a unique application that is synchronizing both user
experience and copyrights while providing services like online music
management, legal downloads, artists’ management. There are several
other applications available in the market that either provides some
specific services or large scale integrated solutions. Our product differs
from the rest in a way that we give more power to the users remaining
within the copyrights circle.
A brief introduction to quadcopter (drone) working. It provides an overview of flight stability, dynamics, general control system block diagram, and the electronic hardware.
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionBert Blevins
Cybersecurity breaches are a growing threat in today’s interconnected digital landscape, affecting individuals, businesses, and governments alike. These breaches compromise sensitive information and erode trust in online services and systems. Understanding the causes, consequences, and prevention strategies of cybersecurity breaches is crucial to protect against these pervasive risks.
Cybersecurity breaches refer to unauthorized access, manipulation, or destruction of digital information or systems. They can occur through various means such as malware, phishing attacks, insider threats, and vulnerabilities in software or hardware. Once a breach happens, cybercriminals can exploit the compromised data for financial gain, espionage, or sabotage. Causes of breaches include software and hardware vulnerabilities, phishing attacks, insider threats, weak passwords, and a lack of security awareness.
The consequences of cybersecurity breaches are severe. Financial loss is a significant impact, as organizations face theft of funds, legal fees, and repair costs. Breaches also damage reputations, leading to a loss of trust among customers, partners, and stakeholders. Regulatory penalties are another consequence, with hefty fines imposed for non-compliance with data protection regulations. Intellectual property theft undermines innovation and competitiveness, while disruptions of critical services like healthcare and utilities impact public safety and well-being.
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
Exact secure outage probability performance of uplinkdownlink multiple access network under imperfect CSI
1. Bulletin of Electrical Engineering and Informatics
Vol. 10, No. 6, December 2021, pp. 3274∼3281
ISSN: 2302-9285, DOI: 10.11591/eei.v10i6.2981 r 3274
Exact secure outage probability performance of uplink-
downlink multiple access network under imperfect CSI
Dinh-Thuan Do, Minh-Sang Van Nguyen
Department of Electronics and Communications, Faculty of Electronics Technology, Industrial University of Ho Chi Minh
City (IUH), Vietnam
Article Info
Article history:
Received Mar 18, 2021
Revised Aug 6, 2021
Accepted Oct 13, 2021
Keywords:
Channel state information
Non-orthogonal multiple
access
Secure performance
ABSTRACT
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) sys-
tems by considering the secure performance at the physical layer. In the considered
system model, the base station acts a relay to allow two users at the left side commu-
nicate with two users at the right side. By considering imperfect channel state infor-
mation (CSI), the secure performance need be studied since an eavesdropper wants to
overhear signals processed at the downlink. To provide secure performance metric,
we derive exact expressions of secrecy outage probability (SOP) and and evaluating
the impacts of main parameters on SOP metric. The important finding is that we can
achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover,
the numerical results demonstrate that the SOP tends to a constant at high SNR. Fi-
nally, our results show that the power allocation factors, target rates are main factors
affecting to the secrecy performance of considered uplink-downlink NOMA systems.
This is an open access article under the CC BY-SA license.
Corresponding Author:
Dinh-Thuan Do
Department of Electronics and Communications, Faculty of Electronics Technology
Industrial University of Ho Chi Minh City (IUH)
Ho Chi Minh City 700000, Vietnam
Email: dodinhthuan@iuh.edu.vn
1. INTRODUCTION
Due to high demands in terms of system capacity and spectrum efficiency, the traditional orthogonal
multiple access (OMA) has been unable to meet the user needs associated with the rapid growth of internet
of things (IoT) and mobile communications [1]–[7]. In order to meet the heavy demand for mobile services,
non-orthogonal multiple access (NOMA) is researched in recent years with promising applications [8], [9].
In some scenarios, NOMA benefits to device-to-device communications [10], [11] and cognitive radio (CR)-
aided NOMA [12]-[14] and these are considered as potential key technologies for the fifth generation mobile
communications (5G). The authors Do, et al. in [13] studied the secondary network of the considered CR-
NOMA by enabling the relaying scheme. In such network, the secondary transmitter is able to conduct energy
harvesting (EH) to perform signal forwarding to distant secondary users. Two main metrics including outage
behavior and throughput performance are studied in the context of EH-assisted CR-NOMA while imperfect
successive interference cancellation (SIC) is considered. Reference Do, et al. [14] presented relay-aided CR-
NOMA networks to improve the performance of far users by enabling partial relay selection architecture. They
explored system performance in terms of full-duplex (FD) and half duplex (HD) relays for both uplink and
downlink communications.
Recently, an alternative approach is enabled to conduct cryptography at physical layer security (PLS)
Journal homepage: http://beei.org
2. Bulletin of Electr Eng & Inf ISSN: 2302-9285 r 3275
has considered. This method is more advanced due to complications of secure techniques applied at higher
layers in existing RFID systems. To aim to decrease chance of eavesdroppers getting information from the
legal transmitter, the wireless channel characteristics is utilized to PLS-based system act relevant approach to
against eavesdroppers’ overhearing operations. The authors in [15]-[20] studied PLS applied for a 5G NOMA
system. The authors in [15] explored the two-user case and then extend our results to a multi-user case. The
main results indicated that the given users’ data rate corresponds to positive secrecy rate. The PLS of millimeter
wave (mmWave) NOMA networks was studied for mmWave channels in [16] by examining imperfect CSI at
receivers and the limited scattering characteristics of concerned channels. the formula of the secrecy outage
probability (SOP) was derived since the system adopts random distributions of legitimate users and eavesdrop-
pers. While [15], [16] presented NOMA downlink scenario, the authors in [18] investigated uplink secure
NOMA system. The typical system including one base station, one eavesdropper and multiple users. However,
there is lack of work considering secure performance of uplink-downlink NOMA system under imperfect CSI
circumstance, which motive us to study secure outage probability in this article.
2. SYSTEM MODEL
In this system model, we consider uplink-downlink of two pairs of source-destination S1−D1, S2−D2
under existence of eavesdropper E, shown in Figure 1. The flat slow Rayleigh fading is assumed for all links
and the channel coefficients pertaining to the links S1 → R, S2 → R, R → D1, R → D2 and R → E
are denoted as g1r, g2r, gd1, gd2 and ge, respectively. Accordingly, the corresponding channel power gains
conform to |g1r|
2
∼ CN (0, λ1r), |g2r|
2
∼ CN (0, λ2r), |gd1|
2
∼ CN (0, λd1), |gd2|
2
∼ CN (0, λd2) and
|ge|
2
∼ CN (0, λe), respectively.
Figure 1. System model
Two sources sends their signals to the relay R in the same time. In particular, the received signal at R
can be expressed as [21].
yS−R = (g1r + h1r)
p
a1Ps1z1 + (g2r + h2r)
p
a2Ps2z2 + nr, (1)
where Psi represents the transmit power at Si; nr is denoted as the variance of the additive white Gaussian
noise (AWGN) at R with nr ∼ CN (0, N0); zi is the signal of Di; ai are the power allocation coefficients of
zi transmitted signals with a1 + a2 = 1 and assuming that a1 > a2; hir is the error term related to imperfect
CSI, which follow a complex Gaussian distributed random variable with CN 0, σ2
hi
. In this circumstance,
σ2
hi is assumed as constant [22].
With regard to higher priority, the relay always first decodes z1 by considering z2 as noise. Following
NOMA principle, the system can performs SIC to decode z2. To further compute system performance metric,
we first calculaye the received signal-to-interference-plus-noise ratio (SINR) for symbol z1. Then, we can
Exact secure outage probability performance of uplink-downlink multiple access network ... (Dinh-Thuan Do)
3. 3276 r ISSN: 2302-9285
determine the signal-to-noise (SNR) for symbol z2. In particular, these values are given as,
γu
z1
=
a1ρs1|g1r|
2
a2ρs2|g2r|
2
+ a1ρs1σ2
h1 + a2ρs2σ2
h2 + 1
, γu
z2
=
a2ρs2|g2r|
2
a1ρs1σ2
h1 + a2ρs2σ2
h2 + 1
, (2)
where ρs1 = Ps1
N0
, ρs2 = Ps2
N0
whoch represent SNR at sources.
Next, the signals received at the destinations can be determined. The relay in the second phase wants
to send superimposed signal generated from zi to destinations Di. Therefore, we can achieve the received
signal at Di as.
yR−Di
= (gdi + hdi)
p
a1Prz1 +
p
a2Prz2
+ ndi (3)
where hdi is the error term which is considered as a complex Gaussian distributed random variable with
CN 0, σ2
di
; ndi stand for the variance of the additive white Gaussian noise (AWGN) at Di with ndi ∼
CN (0, N0).
By processing signals transferred from R, D1 decodes its intended symbol z1 when it treats z2 as
noise. Then, we compute corresponding SINR of z1 at D1 as.
γd
z1
=
a1ρr|gd1|
2
a2ρr|gd1|
2
+ ρrσ2
d1 + 1
(4)
where ρr = Pr
N0
.
At the other side, user D2 first decodes z1 and then employing SIC to achieve signal z2 . At user D2,
SINR of z1 and the SNR of z2 at are expressed respectively by.
γd
1→2 =
a1ρr|gd2|
2
a2ρr|gd2|
2
+ ρrσ2
d2 + 1
, γd
z2
=
a2ρr|gd2|
2
ρrσ2
d2 + 1
(5)
The received signal at E from R can be expressed as.
yE = ge
p
a1Prz1 +
p
a2Prz2
+ ne. (6)
After employing the parallel interference cancellation (PIC) scheme, the received SINR at the eaves-
dropper to detect Di’s message can be formulated by [23].
γe
zi
= aiρe|ge|
2
, (7)
where ρe = Pr
ne
.
In the next step, the achievable secrecy rates of two pairs of users can be examined. Following (2),
(4), and (7), we compute the achievable secrecy rates of S1 − D1 as.
χ1 =
1
2
log2 min
1 + γu
z1
1 + γe
z1
,
1 + γd
z1
1 + γe
z1
!#+
, (8)
where [x]
+
= max {0, x}.
From (2), (5) and (7), the achievable secrecy rates of S2 − D2 is written as.
χ2 =
1
2
log2 min
1 + γu
z2
1 + γe
z2
,
1 + γd
1→2
1 + γe
z2
,
1 + γd
z2
1 + γe
z2
!#+
. (9)
In the next section, we intends to examine secure performance metric which relies on secrecy rates
obtained in these steps.
Bulletin of Electr Eng Inf, Vol. 10, No. 6, December 2021 : 3274 – 3281
4. Bulletin of Electr Eng Inf ISSN: 2302-9285 r 3277
3. SECRECY OUTAGE PROBABILITY (SOP)
3.1. SOP for user pair S1 − D1
To evaluate SOP performance, the secrecy outage event S1 − D1 need be known when z1 cannot be
securely decoded by R or by D1, the SOP for S1 − D1 can be expressed as [23], [24].
SOPS1
D1
= Pr (χ1 R1)
= 1 − Pr
min
1+γu
z1
1+γe
z1
,
1+γd
z1
1+γe
z1
≥ γd1
= 1 − Pr
1 + γu
z1
1 + γe
z1
≥ γd1
| {z }
Ψ1
Pr
1 + γd
z1
1 + γe
z1
≥ γd1
!
| {z }
Ψ2
.
(10)
3.1.1. Proposition 1
The SOP of user pair S1 − D1 is approximated computed as.
SOPS1
D1
= 1 +
ρs1λ1rη1
γd1
ρeλeλea2ρs2λ2r
exp
β1β2 −
φ1κ1
a1ρs1λ1r
Ei (−β1β2) , (11)
where φi = γdi −1, γdi = 22Ri
, (i = 1, 2), Ri is the target data rate for user Di, κ1 = a1ρs1σ2
h1+a2ρs2σ2
h2+1,
κ2 = ρrσ2
d1 + 1, η1 =
R ∞
0
exp
−
κ2γd1
a1ρex+φ1κ2
(a1−a2φ1−a1a2γd1
ρex)ρrλd1
− x
λe
dx, β1 =
γd1
ρeλeκ1+ρs1λ1r
γd1
ρeλea2ρs2
, β2 =
φ1a2ρs2
a1ρs1λ1r
+ 1
λ2r
.
3.1.2. Proof
From (10), Ψ1 can written by.
Ψ1 = Pr
1+γu
z1
1+γe
z1
≥ γd1
= Pr γu
z1
≥ φ1 + γd1 γe
z1
= Pr
|g1r|
2
≥
φ1a2ρs2|g2r|2
+φ1κ1+γd1
a1ρe|ge|2
(a2ρs2|g2r|2
+κ1)
a1ρs1
=
R ∞
0
R ∞
0
1 − F|g1r|2
γd1
a1ρex(a2ρs2y+κ1)+φ1a2ρs2y+φ1κ1
a1ρs1
f|ge|2 (x)f|g2r|2 (y) dxdy,
(12)
where φ1 = γd1
−1 and κ1 = a1ρs1σ2
h1+a2ρs2σ2
h2+1. By conveying the Rayleigh distribution with probability
density function (PDF) and cumulative density function (CDF) f|X|2 (x) = 1
ϕX
exp
− x
ϕX
, F|X|2 (x) =
1 − exp
− x
ϕX
, Ψ1 can be formulated by
Ψ1 =
R ∞
0
R ∞
0
exp
−
γd1
a1ρex(a2ρs2y+κ1)+φ1a2ρs2y+φ1κ1
a1ρs1λ1r
1
λe
exp
− x
λe
1
λ2r
exp
− y
λ2r
dxdy
= 1
λe
1
λ2r
exp
− φ1κ1
a1ρs1λ1r
R ∞
0
R ∞
0
exp
−
γd1
ρe(a2ρs2y+κ1)
ρs1λ1r
+ 1
λe
x
exp
−
φ1a2ρs2
a1ρs1λ1r
+ 1
λ2r
y
×dxdy
= 1
λ2r
exp
− φ1κ1
a1ρs1λ1r
R ∞
0
ρs1λ1r
γd1
ρeλea2ρs2y+γd1
ρeλeκ1+ρs1λ1r
exp
−
φ1a2ρs2
a1ρs1λ1r
+ 1
λ2r
y
dxdy.
(13)
By applying some polynomial expansion manipulations and based on [25] (3.352.4) a5, we obtain Ψ1
as.
Ψ1 = −
ρs1λ1r
γd1
ρeλea2ρs2λ2r
exp
β1β2 −
φ1κ1
a1ρs1λ1r
Ei (−β1β2) , (14)
where β1 =
γd1
ρeλeκ1+ρs1λ1r
γd1
ρeλea2ρs2
, β2 = φ1a2ρs2
a1ρs1λ1r
+ 1
λ2r
.
Exact secure outage probability performance of uplink-downlink multiple access network ... (Dinh-Thuan Do)
5. 3278 r ISSN: 2302-9285
From (10), Ψ2 can written by
Ψ2 = Pr
1+γd
z1
1+γe
z1
≥ γd1
= Pr γd
z1
≥ φ1 + γd1
γe
z1
= Pr
|gd1|
2
≥
κ2γd1
a1ρe|ge|2
+φ1κ2
(a1−a2(φ1+γd1
a1ρe|ge|2
))ρr
=
R ∞
0
1 − F|gd1|2
κ2γd1
a1ρex+φ1κ2
(a1−a2(φ1+γd1
a1ρex))ρr
f|ge|2 (x) dx
=
R ∞
0
exp
−
κ2γd1
a1ρex+φ1κ2
(a1−a2φ1−a1a2γd1
ρex)ρrλd1
1
λe
exp
− x
λe
dx
= 1
λe
R ∞
0
exp
−
κ2γd1
a1ρex+φ1κ2
(a1−a2φ1−a1a2γd1
ρex)ρrλd1
− x
λe
dx,
(15)
where κ2 = ρrσ2
d1 + 1.
It completes the proof.
3.2. SOP for S2 − D2
Similar the user pair S1 − D1, we need examine the secrecy outage event for user pair S2 − D2.
Several cases are examined such as R cannot detect z2, D2 cannot detect its own message z2 when D1 can
detect z1 successfully. As a result, we compute the SOP for user pair S2 − D2 as.
SOPS2
D2
= Pr (χ2 R2)
= 1 − Pr
min
1+γu
z2
1+γe
z2
,
1+γd
1→2
1+γe
z2
,
1+γd
z2
1+γe
z2
≥ γd2
= 1 − Pr
1 + γu
z2
1 + γe
z2
≥ γd2
| {z }
Φ1
Pr
1 + γd
1→2
1 + γe
z2
≥ γd2
| {z }
Φ2
Pr
1 + γd
z2
1 + γe
z2
≥ γd2
!
| {z }
Φ3
.
(16)
3.2.1. Proposition 2
The exact SOP for user pair S2 − D2 is calculated by.
SOPS2
D2
= 1 −
a2ρs2λ2r
κ1γd2 a2ρeλe + a2ρs2λ2r
a2ρrλd2η2
(κ3γd2 a2ρeλe + a2ρrλd2) λe
exp
−
κ1φ2
a2ρs2λ2r
−
κ3φ2
a2ρrλd2
,
(17)
where κ3 = ρrσ2
d2 + 1, η2 =
R ∞
0
exp
−
κ3(φ2+γd2
a2ρex)
(a1−a2φ2−γd2
a2a2ρex)ρrλd2
− x
λe
dx.
3.2.2. Proof
From (16), Φ1 can be calculated as.
Φ1 = Pr
1+γu
z2
1+γe
z2
≥ γd2
= Pr γu
z2
≥ φ2 + γd2 γe
z2
= Pr
|g2r|
2
≥
κ1φ2+κ1γd2
a2ρe|ge|2
a2ρs2
=
R ∞
0
1 − F|g2r|2
κ1φ2+κ1γd2
a2ρex
a2ρs2
f|ge|2 (x) dx
= 1
λe
exp
− κ1φ2
a2ρs2λ2r
R ∞
0
exp
−
κ1γd2
a2ρe
a2ρs2λ2r
+ 1
λe
x
dx
= a2ρs2λ2r
κ1γd2
a2ρeλe+a2ρs2λ2r
exp
− κ1φ2
a2ρs2λ2r
,
(18)
where φ2 = γd2
− 1.
Bulletin of Electr Eng Inf, Vol. 10, No. 6, December 2021 : 3274 – 3281
6. Bulletin of Electr Eng Inf ISSN: 2302-9285 r 3279
Next, Φ2 can be computed as.
Φ2 = Pr
1+γd
1→2
1+γe
z2
≥ γd2
= Pr γd
1→2 ≥ φ2 + γd2
γe
z2
= Pr
|gd2|
2
≥
κ3(φ2+γd2
a2ρe|ge|2
)
(a1−a2φ2−γd2
a2a2ρe|ge|2
)ρr
=
R ∞
0
1 − F|gd2|2
κ3(φ2+γd2
a2ρex)
(a1−a2φ2−γd2
a2a2ρex)ρr
f|ge|2 (x) dx
= 1
λe
R ∞
0
exp
−
κ3(φ2+γd2
a2ρex)
(a1−a2φ2−γd2
a2a2ρex)ρrλd2
− x
λe
dx,
(19)
where κ3 = ρrσ2
d2 + 1.
Using result from (16), Φ3 is expressed by.
Φ3 = Pr
1+γd
z2
1+γe
z2
≥ γd2
= Pr γd
z2
≥ φ2 + γd2
γe
z2
= Pr
|gd2|
2
≥
κ3φ2+κ3γd2
a2ρe|ge|2
a2ρr
=
R ∞
0
1 − F|gd2|2
κ3φ2+κ3γd2
a2ρex
a2ρr
f|ge|2 (x) dx
= 1
λe
exp
− κ3φ2
a2ρrλd2
R ∞
0
exp
−
κ3γd2
a2ρe
a2ρrλd2
+ 1
λe
x
dx
= a2ρrλd2
κ3γd2
a2ρeλe+a2ρrλd2
exp
− κ3φ2
a2ρrλd2
(20)
This is end of the proof.
4. SIMULATION RESULTS
To conduct these simulations, we set ρ = ρs1 = ρs2 = ρr, σ = σ2
h1 = σ2
h2 = σ2
d1 = σ2
d2.
In Figure 2, we show the SOP versus transmit SNR at the source. It can be seen clearly that higher
transmit power at the source will enhance SOP performance, especially in high SNR region. By assigning
different power allocation factors, the second user pair S2 − D2 outperforms that that of S1 − D1 when SNR
is greater than 20 dB. The higher power factor a1 = 0.9 leads to improvement of SOP for S1 − D1. Similarly,
we evaluate the impact of rates R1 R2 on SOP performance, shown in Figure 3. The lower requirement of
target rates indicate the best SOP among three cases of R1 R2 examined. In Figure 4, we can see similar
SOP performance for two user pairs when we change σ. It can be concluded that the quality of channels make
influence on SOP metric..
0 5 10 15 20 25 30 35 40
ρ (dB)
10-2
10-1
100
SOP
S1 − D1 ana.
S2 − D2 ana.
a1= 0.8 sim.
a1= 0.85 sim.
a1= 0.9 sim.
Figure 2. SOP for S1 − D1 and S2 − D2 versus ρ as
changing a1 with R1 = R2 = 1 (bps/Hz), σ = 0.001,
λ1r = λ2r = 1, λd2 = 2, λe = 1, ρe = −20 (dB)
0 5 10 15 20 25 30 35 40
ρ (dB)
10-2
10-1
100
SOP
S1 − D1 ana.
S2 − D2 ana.
R1 = R2= 0.7 (bps/Hz) sim.
R1 = R2= 0.8 (bps/Hz) sim.
R1 = R2= 1 (bps/Hz) sim.
Figure 3. SOP for S1 − D1 and S2 − D2 versus ρ as
changing R1 = R2 with a1 = 0.9, σ = 0.001,
λ1r = λ2r = 1, λd2 = 2, λe = 1, ρe = −20 (dB)
Exact secure outage probability performance of uplink-downlink multiple access network ... (Dinh-Thuan Do)
7. 3280 r ISSN: 2302-9285
0 5 10 15 20 25 30 35 40
ρ (dB)
10-2
10-1
100
SOP
S1 − D1 ana.
S2 − D2 ana.
σ= 0.001 sim.
σ= 0.005 sim.
σ= 0.01 sim.
Figure 4. SOP for S1 − D1 and S2 − D2 versus ρ as changing σ with a1 = 0.9, R1 = R2 = 1 (bps/Hz),
λ1r = λ2r = 1, λd2 = 2, λe = 1, ρe = −20 (dB)
5. CONCLUSION
This paper investigates the joint uplink and downlink approach to evaluate SOP performance of two
user pairs. By assigning fixed power allocation, we can derive exact formulas of SOP for two user pairs.
Specifically, we can conclude that SOP will be enhanced at high transmit power at the sources. We further
examine the impacts of target rate on SOP performance. Under the existence of eavesdropper, we guarabtee
operation of uplink-downlink if we control the quality of channels. Furthermore, we have found that the
imperfect CSI has slight impact on SOP performance.
REFERENCES
[1] H. Huang, W. Xia, J. Xiong, J. Yang, G. Zheng and X. Zhu, “Unsupervised learning-based fast beamforming design
for downlink MIMO,” in IEEE Access, vvol. 7, pp. 7599-7605, 2019, doi: 10.1109/ACCESS.2018.2887308.
[2] G. Gui, H. Sari and E. Biglieri, “A new definition of fairness for non-orthogonal multiple access,” in IEEE Commu-
nications Letters, vol. 23, no. 7, pp. 1267-1271, July 2019, doi: 10.1109/LCOMM.2019.2916398.
[3] B. Wang, F. Gao, S. Jin, H. Lin and G. Y. Li, “Spatial-and frequencywideband effects in millimeter-wave massive
MIMO systems,” in IEEE Transactions on Signal Processing, vol. 66, no. 13, pp. 3393-3406, 1 July, 2018, doi:
10.1109/TSP.2018.2831628.
[4] H. Xie, F. Gao, S. Zhang and S. Jin, “A unified transmission strategy for TDD/FDD massive MIMO systems with
spatial basis expansion model,” in IEEE Transactions on Vehicular Technology, vol. 66, no. 4, pp. 3170-3184, April
2017, doi: 10.1109/TVT.2016.2594706.
[5] Z. M. Fadlullah, et al., “State-of-the-art deep learning: Evolving machine intelligence toward tomorrow’s intelli-
gent network traffic control systems,” in IEEE Communications Surveys Tutorials, vol. 19, no. 4, pp. 2432-2455,
Fourthquarter 2017, doi: 10.1109/COMST.2017.2707140.
[6] N. Kato, et al., “The deep learning vision for heterogeneous network traffic control: Proposal, challenges,
and future perspective,” in IEEE Wireless Communications, vol. 24, no. 3, pp. 146-153, June 2017, doi:
10.1109/MWC.2016.1600317WC.
[7] F. Tang, B. Mao, Z. M. Fadlullah and N. Kato, “On a novel deep-learningbased intelligent partially overlapping
channel assignment in SDN-IoT,” in IEEE Communications Magazine, vol. 56, no. 9, pp. 80-86, Sept. 2018, doi:
10.1109/MCOM.2018.1701227.
[8] Dinh-Thuan Do and Anh-Tu Le, “NOMA based cognitive relaying: Transceiver hardware impairments, relay selec-
tion policies and outage performance comparison,” Computer Communications, vol. 146, pp. 144-154, October 2019,
doi: 10.1016/j.comcom.2019.07.023.
[9] X. Li, Q. Wang, Y. Liu, T. A. Tsiftsis, Z. Ding and A. Nallanathan, “UAV-Aided Multi-Way NOMA Networks with
Residual Hardware Impairments,” in IEEE Wireless Communications Letters, vol. 9, no. 9, pp. 1538-1542, September
2020, doi: 10.1109/LWC.2020.2996782.
[10] X. Li, et al., “Cooperative Wireless-Powered NOMA Relaying for B5G IoT Networks with Hardware Impairments
and Channel Estimation Errors,” in IEEE Internet of Things Journal, vol. 8, no. 7, pp. 5453-5467, April 2021, doi:
10.1109/JIOT.2020.3029754.
Bulletin of Electr Eng Inf, Vol. 10, No. 6, December 2021 : 3274 – 3281
8. Bulletin of Electr Eng Inf ISSN: 2302-9285 r 3281
[11] Anh-Tu Le and Dinh-Thuan Do, ”Implement of multiple access technique by wireless power transfer and relay-
ing network,” Bulletin of Electrical Engineering and Informatics, vol. 10, no. 2, pp. 793-800, April 2021, doi:
10.11591/eei.v10i2.1903.
[12] Thi-Anh Hoang, Chi-Bao Le and Dinh-Thuan Do, ”Security performance analysis for power domain NOMA em-
ploying in cognitive radio networks,” Bulletin of Electrical Engineering and Informatics, vol. 9, no. 3, pp. 1046-1054,
June 2020, doi: 10.11591/eei.v9i3.1639.
[13] Dinh-Thuan Do, A. Le and B. M. Lee, ”NOMA in Cooperative Underlay Cognitive Radio Networks Under Imperfect
SIC,” in IEEE Access, vol. 8, pp. 86180-86195, 2020, doi: 10.1109/ACCESS.2020.2992660.
[14] Dinh-Thuan Do, M. V. Nguyen, F. Jameel, R. Jäntti and I. S. Ansari, ”Performance Evaluation of Relay-Aided
CR-NOMA for Beyond 5G Communications,” in IEEE Access, vol. 8, pp. 134838-134855, 2020, doi: 10.1109/AC-
CESS.2020.3010842.
[15] C. Zhang, F. Jia, Z. Zhang, J. Ge and F. Gong, ”Physical Layer Security Designs for 5G NOMA Systems With
a Stronger Near-End Internal Eavesdropper,” in IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp.
13005-13017, November 2020, doi: 10.1109/TVT.2020.3018234.
[16] S. Huang, M. Xiao and H. V. Poor, ”On the Physical Layer Security of Millimeter Wave NOMA Net-
works,” in IEEE Transactions on Vehicular Technology, vol. 69, no. 10, pp. 11697-11711, October 2020, doi:
10.1109/TVT.2020.3017086.
[17] R. M. Christopher and D. K. Borah, ”Physical Layer Security for Weak User in MISO NOMA Using Direc-
tional Modulation (NOMAD),” in IEEE Communications Letters, vol. 24, no. 5, pp. 956-960, May 2020, doi:
10.1109/LCOMM.2020.2975193.
[18] K. Cao, B. Wang, H. Ding, L. Lv, J. Tian and F. Gong, ”On the Security Enhancement of Uplink NOMA Systems
With Jammer Selection,” in IEEE Transactions on Communications, vol. 68, no. 9, pp. 5747-5763, September 2020,
doi: 10.1109/TCOMM.2020.3003665.
[19] H. -M. Wang and X. Zhang, ”UAV Secure Downlink NOMA Transmissions: A Secure Users Oriented Per-
spective,” in IEEE Transactions on Communications, vol. 68, no. 9, pp. 5732-5746, September 2020, doi:
10.1109/TCOMM.2020.3002268.
[20] B. Li, X. Qi, K. Huang, Z. Fei, F. Zhou and R. Q. Hu, ”Security-Reliability Tradeoff Analysis for Cooperative NOMA
in Cognitive Radio Networks,” in IEEE Transactions on Communications, vol. 67, no. 1, pp. 83-96, January 2019,
doi: 10.1109/TCOMM.2018.2873690.
[21] S. Arzykulov, T. A. Tsiftsis, G. Nauryzbayev and M. Abdallah, ”Outage Performance of Cooperative Underlay CR-
NOMA With Imperfect CSI,” in IEEE Communications Letters, vol. 23, no. 1, pp. 176-179, January 2019, doi:
10.1109/LCOMM.2018.2878730.
[22] Z. Yang, Z. Ding, P. Fan and G. K. Karagiannidis, ”On the Performance of Non-orthogonal Multiple Access Systems
With Partial Channel Information,” in IEEE Transactions on Communications, vol. 64, no. 2, pp. 654-667, February
2016, doi: 10.1109/TCOMM.2015.2511078.
[23] J. Chen, L. Yang and M. Alouini, ”Physical Layer Security for Cooperative NOMA Systems,” in IEEE Transactions
on Vehicular Technology, vol. 67, no. 5, pp. 4645-4649, May 2018, doi: 10.1109/TVT.2017.2789223.
[24] Y. Feng, S. Yan, C. Liu, Z. Yang and N. Yang, ”Two-Stage Relay Selection for Enhancing Physical Layer Security in
Non-Orthogonal Multiple Access,” in IEEE Transactions on Information Forensics and Security, vol. 14, no. 6, pp.
1670-1683, June 2019, doi: 10.1109/TIFS.2018.2883273.
[25] I. S. Gradshteyn and I. M. Ryzhik, ”Table of Integrals, Series and Products, 6th ed,” Academic Press, New York, NY,
USA, 2000.
Exact secure outage probability performance of uplink-downlink multiple access network ... (Dinh-Thuan Do)