Next Article in Journal
Electrochemiluminescence Sensor Based on Electrospun Three-Dimensional Carbon Nanofibers for the Detection of Difenidol Hydrochloride
Previous Article in Journal
Thermal Imager Range: Predictions, Expectations, and Reality
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On Exact Outage and Throughput Performance of Cognitive Radio based Non-Orthogonal Multiple Access Networks With and Without D2D Link

1
Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City 700000, Vietnam
2
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh City 700000, Vietnam
3
School of Intelligent Mechatronics Engineering, Sejong University, Seoul 05006, Korea
*
Authors to whom correspondence should be addressed.
Sensors 2019, 19(15), 3314; https://doi.org/10.3390/s19153314
Submission received: 18 June 2019 / Revised: 23 July 2019 / Accepted: 25 July 2019 / Published: 28 July 2019
(This article belongs to the Section Sensor Networks)

Abstract

:
In this paper, we investigate the performance of a secondary network in a cognitive radio network employing a non-orthogonal multiple access (NOMA) scheme to form a CR-NOMA system serving many destination users. In the secondary network of our proposed system, a device-to-device (D2D) scheme is deployed to further provide the signal transmission at a close distance of NOMA users in downlink, and such performance is evaluated under the situation of interference reception from the primary network. An outage performance gap exists among these NOMA users since different power allocation factors are assigned to the different destinations. Unlike existing NOMA schemes that consider fixed power allocation factors, which are not optimal in terms of outage performance, our proposed paradigm exhibits optimal outage in the scenario of D2D transmission. In particular, the outage performances in two kinds of schemes in term of existence of D2D link are further achieved. Simulation results validate the analytical expressions, and show the advantage of each scheme in the proposed CR-NOMA system based on outage performance and throughput.

1. Introduction

As a spectrum sharing model, cognitive radio (CR) can enhance traditional statistical spectrum utilization by permitting a secondary user (SU) to access the resource of the primary user (PU) when there is idle spectrum. There are two popular kinds of novel technologies to satisfy the demands of spectrum resources, namely overlay CR and underlay CR. The first one dynamically chooses vacant channels and does not have inter-user interference, while the second one chooses channels which have a certain interference temperature. As a main condition, the SU is constrained to make a harmless impact on the normal communications in the network containing the PU. By employing spectrum sensing, the SU senses the idle spectrum [1,2,3]. In the traditional schemes, when the absence of the PU is recognized, the SU can only access to the idle channel. Moreover, the SU is required to leave the occupied channel if there exists the presence of the PU. There is a widely deployed energy detection strategy to detect the PU by comparing a determined threshold to the accumulated energy statistics of the PU signal. The PU is known to be absent in the case that any energy statistics are less than their thresholds [4,5,6,7].
To implement the future wireless networks, Non-Orthogonal Multiple Access (NOMA) is proposed as one of the strong candidates since it supports massive connectivity and high spectral efficiency [8]. To achieve massive users on the same radio resources block (i.e., frequency and time), NOMA users are simultaneously served by splitting them into power domain. To address such ability, superposition coding (SC) is implemented at the transmitter and successive interference canceler (SIC) is required at the receivers. Power domain based NOMA was firstly recommended for the future radio networks in [9]. NOMA benefits from its superiority compared to the orthogonal multiple access (OMA) techniques in terms of the overall system capacity. The physical layer security was implemented to enable secure transmission in the context of NOMA, and the secure outage probability of downlink NOMA system was studied in [10], and it is further recommended to deploy in the Internet of Things (IoT) system. Extended coverage and reliable transmission are benefited from various schemes of cooperative relaying network reported in [11,12,13,14,15,16,17,18]. The authors of [19,20,21] introduced a cooperative relaying network using the architecture of NOMA. Device-to-device (D2D) transmission was proposed to deploy NOMA and the outage behavior performance was evaluated [19]. The applications of NOMA with the other relaying techniques also have received a great deal of attention to exhibit the reliability of such cooperative NOMA communication, which is considered one of the most investigated topics. The worse case of NOMA under a situation of imperfect channel state information (CSI) was investigated in [20], and the achievable outage probability was analyzed. In addition, other cooperative-NOMA was examined in [21,22,23] based on the assumption that the strong users have prior knowledge of the weaker users’ messages. In these schemes, relay can act in a role of the user who intends to serve a far user in a downlink NOMA scheme. The outage probability and the diversity order of the cooperative-NOMA were analyzed in [21,22] with the wireless power transfer technique. In these NOMA networks, a single antenna node was assumed. In [23], the authors extended the analysis in [21,22] and assumed the node is equipped with multiple antennas.
The combined architecture of NOMA and CR, namely CR-NOMA, was designed in a cooperative NOMA [24,25,26,27]. As a promising technique, an underlay cognitive radio network (CRN) with NOMA was proposed to solve the problem of scarce spectrum. To improve the transmission secrecy, such novel NOMA-enabled underlay CRN can be employed for the deliberately introduced interference. For example, NOMA with imperfect successive interference cancellation (SIC) was explored in an underlay CR network [24]. To evaluate CR-NOMA under a situation when eavesdroppers overhear a legal signal, secure analysis is an open problem in such CR-NOMA. In [25], a NOMA system was investigated in terms of secure performance. Considering on degraded performance due to the imperfect CSI, the authors indicated optimal power allocation coefficients for different distances of the users to achieve the outage probability fairness for both users, and the proposed system model showed the superiority of the CR-NOMA compared to cooperative orthogonal multiple access (OMA) [27].
To meet both the high-throughput requirement and massive connectivity, the authors of [28,29,30,31,32,33] explored Device-to-device (D2D) communications. For example, D2D-enabled dense heterogeneous networks (HetNets) with NOMA was studied in [28]. In particular, they considered joint power allocation and user scheduling to maximize the ergodic sum rate of the near users (NUs) located in the small cells while guaranteeing the quality-of-service requirements of the far user [28]. They confirmed that the NOMA technique invoked to serve more downlink users simultaneously. D2D-enabled multi-hop transmission was deployed to improve signal reception of the far users on the cell edge. The authors of [29] introduced D2D communications which are containing an uplink cellular system and sparse code multiple access (SCMA) technology. In such SCMA-assisted D2D network, the base station (BS) can decode the signals of cellular users without mutual interference. Mobile edge computing (MEC) and NOMA have been proposed as the promising techniques in [29]. The authors of [30] considered how to minimize the weighted sum of the energy consumption and delay in all users by jointly optimizing the channel allocations, computing resource, and power. More specifically, they recommended a novel power allocation algorithm using the particle swarm optimization (PSO) to apply in the single NOMA group including multiple cellular users. In [31], the resource allocation problem for D2D underlaid cellular networks was examined in terms of the uplink multi-carrier NOMA.
Motivated by recent works [27,31], this paper considers a new cooperative CR-NOMA system using with and without a D2D link, where the secondary network with the fixed power source was evaluated to satisfy the interference constraint for the primary network. In recent work [27], they did not consider situation as two NOMA users located in proximity scenario. In such circumstance, D2D is an efficient way for two users to communicate with high speed and high capacity. This is a challenging situation, as the primary network in the considered CR-NOMA degrades the performance of the secondary network with existence of interference and other transmit power constraints. These analyses are main motivation for this paper, which examines a new system model that merges schemes including NOMA and D2D into CR-NOMA. Such a NOMA scheme is designed to help improve the signal quality by forwarding the signal to a representative weak user from a strong user in NOMA.
The main contributions of this work are summarized as follows.
  • We examine a new D2D transmission using a system model developed in [27]. Different from the results in [27], in this paper, D2D supports a new transmission for close users who are located in a narrow cluster in a normal cellular network.
  • We formulate two cases of analytic expressions that consider existence/non-existence of a D2D link in the CR-NOMA of secondary network under interference constraint from the primary network. The underlay CR-NOMA provides an ability to serve D2D transmission. We show that two NOMA users served by the BS exhibit a performance gap in terms of outage behavior.
  • The formulated problem of outage probability is difficult to evaluate, and thus, to tackle this challenge, an asymptotic analysis is provided to present more insights into the proposed system.
  • Extensive simulation results are provided and the simulation results show that there is a trade-off between the transmission SNR at the BS of a secondary network and the outage behavior of each user in the context of NOMA. Besides, the interference term originated from a primary network also impacts the performance of UEs in the secondary network.
The rest of this paper is organized as follows. In Section 2, the system model is presented. Section 3 presents the formulated problem in term of outage behavior and its asymptotic analysis. Section 4 presents a more challenging scenario to provide D2D transmission along with their outage performance. Section 5 presents numerical results. Finally, the paper is concluded in Section 6.

2. System Model

The system model is shown in Figure 1 and such a system comprises primary network (PN) and underlay secondary network (SN). In this model, there are two transmit sources, called base stations (PT and BS in Figure 1), and three users. PD is the user in the primary network while U 1 , U 2 are two users in the secondary network. A relaying scheme is employed at SN to perform transmission from a base station (BS) to two device-to-device (D2D) users ( U 1 , U 2 ) and D2D transmission is supported by those two users. It is worth pointing out U 1 , U 2 are considered as far user and near user, respectively, in the context of NOMA. Here, we denote the BS as S. Due to the existence of PN, the SN meets interference from primary transmitter (PT) who belongs to the PN [27]. Three users in SN also impact on the primary destinations (PD) in the PN, and h S D , h D 1 , h D 2 indicate links, as in Figure 1. The channel coefficients h 1 , h 2 are used for link BS–first D2D user and BS–second D2D user, respectively. I P is the interference channel from PT affecting on two D2D users. g k , i is the channel coefficient for D2D transmission ( i = 1 , 2 ). It is denoted that channel u has exponential distribution with means λ u , and I P C N 0 , N 0 ξ . Thus, the secondary transmission node k is restricted as [27] P k min P ¯ k , I t h h Y 2 , k S , U 1 , U 2 and Y S D , D 1 , D 2 . P ¯ k stands for the maximum average transmission power and I t h indicates the interference temperature constraint (ITC) at PD.
We call x 1 and x 2 as the messages sent by the BS, which serve both the weak user U 1 and the strong user U 2 . a 1 and a 2 are the power allocation coefficients in NOMA scheme. Following the principle of NOMA, we assume that a 1 > a 2 with a 1 + a 2 = 1 .
In the first phase, the received signal at the user U i , i 1 , 2 is expressed as,
y n , i k = h i P S a 1 s 1 k + P S a 2 s 2 k + I P + n i k ,
where n i stands for the additive white Gaussian noise (AWGN) at the receiver with variance N 0 . Regarding detection, the signal-to-interference-plus-noise ratio (SINR) after detecting s 1 of user U 1 can be computed as,
γ 1 , 1 = ρ S a 1 h 1 2 ρ S a 2 h 1 2 + ξ + 1 ,
where ρ S = P S N 0 is the transmission SNR at the BS. Similarly, the SINR to decode signal s 1 at user U 2 is given by,
γ 2 , 1 = ρ S a 1 h 2 2 ρ S a 2 h 2 2 + ξ + 1 .
To implement NOMA, by performing successive interference cancellation (SIC), it can be determined to detect signal x 2 at U 2 , and we have signal-to-noise (SNR) as,
γ 2 , 2 = ρ S a 2 h 2 2 ξ + 1 .

3. Scheme 1: Performance Analysis of Outage Probability without D2D Link

3.1. Outage Probability of U 1

In this section, the performance analysis of outage probability (OP) without D2D link is investigated. We call this as Scheme 1. The OP is calculated based on the probability density function (PDF) and the cumulative distribution function (CDF) of channel g k , i , which can be represented as,
f g k , i 2 x = 1 λ k , i e x λ k , i ,
and
F g k , i 2 x = 1 e x λ k , i .
The outage probability (OP) of the message is defined as the probability that the achievable SNR is below a predefined SNR. In this case, we denote ε 1 = 2 2 R 1 1 , and R 1 is the target rate for user U 1 . By denoting P r ( . ) as the probability function, the outage behavior of user U 1 can be shown as,
O P U 1 I = 1 Pr γ 1 , 1 > ε 1 .
Proposition 1.
The outage probability of U 1 is given by,
O P U 1 I = 1 e θ ρ ¯ S λ 1 1 e ρ I ρ ¯ S λ S P + 1 e ρ I λ 1 + λ S P θ ρ ¯ S λ 1 λ S P ,
where θ = υ a 1 ε 1 a 2 , υ = ε 1 ξ + 1 and 1 = λ 1 ρ I λ S P θ + λ 1 ρ I .
Proof. 
See Appendix A. □

3.2. Outage Probability of U 2

It is worth noting that the successful operation of U 2 happens based on SIC. Therefore, the outage probability of U 2 is expressed as
O P U 2 I = 1 Pr γ 2 , 1 > ε 1 , γ 2 , 2 > ε 2 .
Similar to solving expression obtained from Equation (7), it can be formulated that
O P U 2 I = 1 Pr h 2 2 > ψ ρ ¯ S , h S P 2 < ρ I ρ ¯ S + Pr h 2 2 > ψ ρ I h S P 2 , h S P 2 > ρ I ρ ¯ S ,
where ε 2 = 2 2 R 2 1 , υ 2 = ε 2 ξ + 1 and ψ = max υ 2 a 2 , θ . Thus, it can be rewritten in the following form after some manipulations:
O P U 2 I = 1 e ψ ρ ¯ S λ 2 1 e ρ I ρ ¯ S λ S P + λ 2 ρ I e ρ I λ 2 + ψ λ S P ρ ¯ S λ 2 λ S P λ 2 ρ I + ψ λ S P .
Remark 1.
In the context of NOMA architecture, the two paired users’ demand signals are superposed based on difference in their channel conditions and they acquire the same frequency band. In a real deployment, the hardware designer needs to know the quality of such CR-NOMA adapting to signal detection at each receiver. In this regard, outage probabilities in Equations (8) and (11) are crucial terms the need to be studied in terms of system performance. As a result, the outage performance is an important metric to evaluate the success of the transmission with the existence of D2D link at secondary network in such a CR-NOMA. As with most recent works, outage probability is a priority evaluation in these investigations to highlight advantages of emerging techniques [11,12,13,14,15,16,17,18,19,20,21]. Due to the high complexity for the two derived expressions for U 1 and U 2 , numerical simulations are presented in the next section.

3.3. Asymptotic Analysis

To provide further insight, asymptotic outage performance is presented.
First, we consider the case of ρ ¯ S , and then approximate outage behaviors for users U 1 , U 2 are computed.
O P U 1 I , ρ ¯ S = 1 1 ,
and
O P U 2 I , ρ ¯ S 1 λ 2 λ 2 + ψ ¯ λ S P .
Second, in the case of ρ I , approximate outage behaviors for users U 1 , U 2 are given as,
O P U 1 I , ρ I = 1 e θ ρ ¯ S λ 1 ,
and
O P U 2 I , ρ I = 1 e ψ ρ ¯ S λ 2 .

4. Scheme 2: Performance Analysis of Outage Probability with D2D Link

Now, we present the outage probability with D2D Link. We call this as Scheme 2. s c is a signal which communicates via such a D2D link. Then, the received signal at user U i can be given as,
c i = g k , i P U i s c + I P + n c , i ,
where i k . Here, we denote g k , i as a Rayleigh fading channel coefficient in D2D link from user k to user i, and s c , s 1 are unit signals with E s 1 2 = E s c 2 = 1 . In the next step, SNR can be obtained to decode a signal at each user corresponding to the D2D link,
W i = g k , i 2 P U i N 0 = ρ U i g k , i 2 ξ + 1 ,
where ρ U i = P U i N 0 . In final step, the SINR for decoding s 1 under a combination of the D2D link and downlink where NOMA from the BS is given by,
Z cN , 1 bi = min max γ 1 , 1 , W 1 , γ 2 , 1 i f h 1 2 < h 2 2 , min max γ 2 , 1 , W 2 , γ 1 , 1 o t h e r w i s e

4.1. Outage Probability of U 1

The outage probability (OP) related to the message at user U i is defined as the probability that the SINR is below a predefined SINR ε i . If the non-SIC user ( U 1 ) meets the outage behavior, the SIC user ( U 2 ) does not require a signal from the D2D link. In addition, the outage of the SIC user does not allow the cooperation from the D2D link. Then, we compute the OP for U 1 as,
O P U 1 I I = Pr γ 1 , 1 < ε 1 , γ 2 , 1 < ε 1 A 1 + Pr max γ 1 , 1 , W 1 < ε 1 , γ 2 , 1 > ε 1 A 2
Lemma 1.
The expected A 1 is given by
A 1 = 1 e θ λ 1 ρ ¯ S 1 e θ λ 2 ρ ¯ S 1 e ρ I λ S P ρ ¯ S + e ρ I ρ ¯ S λ S P 1 e λ S P θ + λ 1 ρ I λ S P λ 1 ρ ¯ S 2 e λ S P θ + λ 2 ρ I λ S P λ 2 ρ ¯ S + 3 e λ S P λ 2 θ + λ S P λ 1 θ + λ 1 λ 2 ρ I λ S P λ 1 λ 2 ρ ¯ S ,
where 2 = λ 2 ρ I λ S P θ + λ 2 ρ I and 3 = λ 1 λ 2 ρ I λ S P λ 2 θ + λ S P λ 1 θ + λ 1 λ 2 ρ I .
Proof. 
See Appendix B. □
Then, A 2 can be expressed as,
A 2 = Pr max γ 1 , 1 , W 1 < ε 1 , γ 2 , 1 > ε 1 = Pr γ 1 , 1 < ε 1 , W 1 < ε 1 A 2 , 1 Pr γ 2 , 1 > ε 1 A 2 , 2
In this study, R 1 , R 2 denote the target rates corresponding to users U 1 , U 2 .
Next, A 2 , 1 can be formulated as,
A 2 , 1 = Pr γ 1 , 1 < ε 1 Pr W 1 < ε 1 ,
Conditioning on h S P , Pr γ 1 , 1 < ε 1 can be calculated as,
Pr γ 1 , 1 < ε 1 = Pr h 1 2 < θ ρ ¯ S , h S P 2 < ρ I ρ ¯ S + Pr h 1 2 < h S P 2 θ ρ I , h S P 2 > ρ I ρ ¯ S
Then, Pr γ 1 , 1 < ε 1 can be rewritten as,
Pr γ 1 , 1 < ε 1 = 1 e θ λ 1 ρ ¯ S 1 e ρ I λ S P ρ ¯ S + e ρ I λ S P ρ ¯ S 1 e θ λ S P + λ 1 ρ I λ 1 ρ ¯ S λ S P
The second term of Equation (22) is calculated by,
Pr W 1 < ε 1 = g k , 1 2 < υ ρ ¯ U , h D 1 2 < ρ I ρ ¯ U + Pr g k , 1 2 < υ h D 1 2 ρ I , h D 1 2 > ρ I ρ ¯ U = 1 e υ λ k , 1 ρ ¯ U 1 e ρ I λ D 1 ρ ¯ U + e ρ I λ S P ρ ¯ U 4 e υ λ S P + λ k , 1 ρ I λ k , 1 ρ ¯ S λ S P
where 4 = λ k , 1 ρ I υ λ S P + λ k , 1 ρ I .
Similarly, A 2 , 2 can be obtained as,
A 2 , 2 = Pr h 2 2 > θ ρ ¯ S , h S P 2 < ρ I ρ ¯ S + Pr h 2 2 > θ h S n P 2 ρ I , h S P 2 > ρ I ρ ¯ S .
This can be rewritten as,
A 2 , 2 = e θ λ 2 ρ ¯ S 1 e ρ I λ S P ρ ¯ S + 2 e λ S P θ + λ 2 ρ I λ S P λ 2 ρ ¯ S .
Putting Equations (24), (25) and (27) into Equation (19) and using result in Lemma 1, the outage probability of U 2 can be expressed as,
O P U 1 I I = 1 e θ λ 1 ρ ¯ S 1 e θ λ 2 ρ ¯ S 1 e ρ I λ S P ρ ¯ S + e ρ I ρ ¯ S λ S P 1 e λ S P θ + λ 1 ρ I λ S P λ 1 ρ ¯ S 2 e λ S P θ + λ 2 ρ I λ S P λ 2 ρ ¯ S + 3 e λ S P λ 2 θ + λ S P λ 1 θ + λ 1 λ 2 ρ I λ S P λ 1 λ 2 ρ ¯ S + 1 e θ λ 1 ρ ¯ S 1 e ρ I λ S P ρ ¯ S + e ρ I λ S P ρ ¯ S 1 e θ λ S P + λ 1 ρ I λ 1 ρ ¯ S λ S P × 1 e υ λ k , 1 ρ ¯ U 1 e ρ I λ D 1 ρ ¯ U + e ρ I λ S P ρ ¯ U 4 e υ λ S P + λ k , 1 ρ I λ k , 1 ρ ¯ S λ S P × e θ λ 2 ρ ¯ S 1 e ρ I λ S P ρ ¯ S + 2 e λ S P θ + λ 2 ρ I λ S P λ 2 ρ ¯ S .

4.2. Outage Probability of U 2

Similarly, the outage probability of U 2 can be formulated as,
O P U 2 I I = Pr γ 2 , 2 < ε 2 γ 2 , 1 < ε 1 , γ 1 , 1 < ε 1 B 1 + Pr γ 2 , 2 < ε 2 max γ 2 , 1 , W 2 < ε 1 , γ 1 , 1 > ε 1 B 2
Then, B 1 is computed by,
B 1 = Pr γ 2 , 2 < ε 2 γ 2 , 1 < ε 1 , γ 1 , 1 < ε 1 = 1 Pr γ 2 , 2 > ε 2 , γ 2 , 1 > ε 1 B 1 , 1 Pr γ 1 , 1 < ε 1 B 1 , 2
Similarly, B 1 , 1 can be achieved as
B 1 , 1 = 1 Pr h 2 2 > ψ ρ ¯ S , h S P 2 < ρ I ρ ¯ S + Pr h 2 2 > ψ h S P 2 ρ I , h S P 2 > ρ I ρ ¯ S = 1 e ψ λ 2 ρ ¯ S 1 e ρ I λ S P ρ ¯ S + λ 2 ρ I e ψ λ S P + λ 2 ρ I λ S P λ 2 ρ ¯ S ψ λ S P + λ 2 ρ I .
In a similar way, B 1 , 2 can be written as
B 1 , 2 = 1 e θ λ 1 ρ ¯ S 1 e ρ I λ S P ρ ¯ S + e ρ I λ S P ρ ¯ S 1 e θ λ S P + λ 1 ρ I λ S P λ 1 ρ ¯ S
As a result, B 1 can be computed as follows.
B 1 = 1 e ψ λ 2 ρ ¯ S 1 e ρ I λ S P ρ ¯ S + λ 2 ρ I e ψ λ S P + λ 2 ρ I λ S P λ 2 ρ ¯ S ψ λ S P + λ 2 ρ I × 1 e θ λ 1 ρ ¯ S 1 e ρ I λ S P ρ ¯ S + e ρ I λ S P ρ ¯ S 1 e θ λ S P + λ 1 ρ I λ S P λ 1 ρ ¯ S .
Likewise, following results can be achieved for B 2 .
B 2 = Pr γ 2 , 2 < ε 2 max γ 2 , 1 , W 2 < ε 1 , γ 1 , 1 > ε 1 = B 2 , 1 + B 2 , 2 B 2 , 3 B 2 , 4 .
where B 2 , 3 = Pr γ 2 , 2 < ε 2 , γ 2 , 1 < ε 1 , W 2 < ε 1 , B 2 , 1 = Pr γ 2 , 2 < ε 2 , B 2 , 2 = Pr max γ 2 , 1 , W 2 < ε 1 and B 2 , 4 = Pr γ 1 , 1 > ε 1 . More specifically, B 2 , 1 is given as
B 2 , 1 = 1 e υ 2 λ 2 ρ ¯ S Θ 2 1 e ρ I λ S P ρ ¯ S + e ρ I λ S P ρ ¯ S λ 2 ρ I Θ 2 λ S P υ 2 + λ 2 ρ I Θ 2 e λ S P υ 2 + λ 2 ρ I Θ 2 λ S P λ 2 ρ ¯ S Θ 2 .
Next, B 2 , 2 can be calculated as
B 2 , 2 = 1 e θ λ 2 ρ ¯ S 1 e ρ I λ S P ρ ¯ S + e ρ I λ S P ρ ¯ S 2 e θ λ S P + λ 2 ρ I λ 2 ρ ¯ S λ S P × 1 e υ λ k , 2 ρ ¯ U 1 e ρ I λ D 2 ρ ¯ U + e ρ I λ S P ρ ¯ U 4 e υ λ S P + λ k , 2 ρ I λ k , 2 ρ ¯ S λ S P .
B 2 , 3 and B 2 , 4 need to be computed, and they can be given as
B 2 , 3 = 1 e ϖ λ 2 ρ ¯ S 1 e ρ I λ S P ρ ¯ S + e ρ I λ S P ρ ¯ S λ 2 ρ I e ϖ λ S P + λ 2 ρ I λ 2 ρ ¯ S λ S P ϖ λ S P + λ 2 ρ I × 1 e υ λ k , 2 ρ ¯ U 1 e ρ I λ D 2 ρ ¯ U + e ρ I λ S P ρ ¯ U 4 e υ λ S P + λ k , 2 ρ I λ k , 2 ρ ¯ S λ S P ,
B 2 , 4 = e θ λ 1 ρ ¯ S 1 e ρ I λ S P ρ ¯ S + 1 e λ S P θ + λ 1 ρ I λ S P λ 1 ρ ¯ S
where ϖ = min υ 2 a 2 , θ .
Plugging Equations (34) and (35), into Equation (30), the outage probability of U 2 can be expressed as
O P U 2 I I = 1 e ψ λ 2 ρ ¯ S 1 e ρ I λ S P ρ ¯ S + λ 2 ρ I e ψ λ S P + λ 2 ρ I λ S P λ 2 ρ ¯ S ψ λ S P + λ 2 ρ I × 1 e θ λ 1 ρ ¯ S 1 e ρ I λ S P ρ ¯ S + e ρ I λ S P ρ ¯ S 1 e θ λ S P + λ 1 ρ I λ S P λ 1 ρ ¯ S + 1 e υ 2 λ 2 ρ ¯ S a 2 1 e ρ I λ S P ρ ¯ S + e ρ I λ S P ρ ¯ S λ 2 ρ I a 2 e λ S P υ 2 + λ 2 ρ I a 2 λ S P λ 2 ρ ¯ S a 2 λ S P υ 2 + λ 2 ρ I a 2 + 1 e θ λ 2 ρ ¯ S 1 e υ λ k , 2 ρ ¯ U 1 e ρ I λ S P ρ ¯ S 1 e ρ I λ D 2 ρ ¯ U + e ρ I λ D 2 ρ ¯ U λ k , 2 ρ I e λ D 2 υ + λ k , 2 ρ I λ D 2 λ k , 2 ρ ¯ U λ D 2 υ + λ k , 2 ρ I × e ρ I ρ ¯ S λ S P λ 2 ρ I e λ S P θ + λ 2 ρ I λ S P λ 2 ρ ¯ S λ S P θ + l λ 2 ρ I 1 e ϖ λ 2 ρ ¯ S 1 e υ λ k , 2 ρ ¯ U 1 e ρ I λ S P ρ ¯ S 1 e ρ I λ D 2 ρ ¯ U + e ρ I λ D 2 ρ ¯ U λ k , 2 ρ I λ D 2 υ + λ k , 2 ρ I e λ D 2 υ + λ k , 2 ρ I λ D 2 λ k , 2 ρ ¯ U e ρ I ρ ¯ S λ S P λ 2 ρ I λ S P ϖ + λ 2 ρ I e λ S P ϖ + λ 2 ρ I λ S P λ 2 ρ ¯ S × e θ λ 1 ρ ¯ S 1 e ρ I λ S P ρ ¯ S + λ 1 ρ I λ S P θ + λ 1 ρ I e λ S P θ + λ 1 ρ I λ S P λ 1 ρ ¯ S .
Remark 2.
It is difficult to find the optimal outage performance of each user in SN of CR-NOMA. It is expected that the numerical method would provide the optimal value of power allocation factor to indicate the lowest outage performance. The numerical result section introduces optimal performance. Such analysis and related guidelines are useful evaluations before implementing the CR-NOMA in a practical way.

4.3. Asymptotic Analysis

Since the derived expressions are rather complicated, the asymptotic expressions for the outage probability to provide additional insight needs to be investigated.
In the first case for ρ I , the asymptotic expression for O P U 1 is given as
O P U 1 I I , ρ I = 1 e θ λ 1 ρ ¯ S 1 e θ λ 2 ρ ¯ S + 1 e θ λ 1 ρ ¯ S 1 e υ λ k , 1 ρ ¯ U e θ λ 2 ρ ¯ S
and
O P U 2 I I , ρ I = 1 e ψ λ 2 ρ ¯ S 1 e θ λ 1 ρ ¯ S + 1 e υ 2 λ 2 ρ ¯ S a 2 + 1 e θ λ 2 ρ ¯ S 1 e υ λ k , 2 ρ ¯ U 1 e ϖ λ 2 ρ ¯ S 1 e υ λ k , 2 ρ ¯ U e θ λ 1 ρ ¯ S .
In the second scenario, i.e., ρ ¯ S , O P U 1 is computed as
O P U 1 I I , ρ ¯ S = 1 1 2 + 3 + 1 1 1 4 2 ,
and
O P U 2 I I , ρ ¯ S = 1 λ 2 ρ I ψ λ S P + λ 2 ρ I 1 1 + 1 λ 2 ρ I a 2 λ S P υ 2 + λ 2 ρ I a 2 + 1 λ k , 2 ρ I λ D 2 υ + λ k , 2 ρ I 1 2 1 λ k , 2 ρ I λ D 2 υ + λ k , 2 ρ I 1 λ 2 ρ I λ S P ϖ + λ 2 ρ I 1 .

4.4. Consideration on Throughput

Regarding other metric n = ( I , I I ) , the overall throughput needs to be examined.
T t o t a l n = R 1 1 O P U 1 n + R 2 1 O P U 2 n

5. Numerical Results

The simulation model is based on Figure 1, and we assume fixed power allocation factors are assigned for two NOMA users: a 1 = 0.8 and a 2 = 0.2 . In the simulations, we set d 1 = 1.8 , d 2 = 1.2 , d k , 1 = d k , 2 = 3 , d S P = d D 1 = d D 2 = 5 , ρ I = 20 d B , ρ = ρ ¯ S = ρ ¯ U 1 = ρ ¯ U 2 and R = R 1 = R 2 = 1 bit per channel use (BPCU). The path loss exponent is χ . Here, we denote “ana.” and “sim.” as analytical results and simulated curves, respectively. MATLAB was employed to verify these derived expressions to further provide system performance evaluation intuitively. Figure 2 shows the OP results obtained for several scenarios of target rates R = 0.1 , 0.5 , 1 . It is easily observed that a higher target rate results in worse outage performance. In addition, the higher ρ converges to the constant value of such OP. The performance gap among two users exists due to the different power allocation factors for each user. We also plot asymptotic cases and lower-bounded approximation, which provides a performance limit of such OP in the proposed system. Furthermore, the analytical results of OP was verified by the simulations. As observed, both match very well.
In the proposed system model, the impact of interference is indicated in Figure 3. A similar trend of OP can be seen in this illustration compared to Figure 2. Higher target rate and high ρ I exhibit the best outage behavior. Hence, ρ I = 20 ( dB ) , R = 0.2 ( bps / Hz ) is the best outage performance that can be raised in these comparisons.
Figure 4 and Figure 5 show the outage performance versus transmission SNR at the BS, ρ and ρ I , respectively, to raise the performance gap among two NOMA users in the CR-NOMA scenario with varying path loss exponent factors. It can be seen that the asymptotic curves match the exact curves at high ρ and ρ I for Figure 4 and Figure 5, respectively. Different power allocation factors are recognized as the main reason for such a performance gap. Each figure indicates that outage performance will meet the saturation situation at high ρ and ρ I for Figure 2 and Figure 3, respectively. It can be explained that such result is straightforward from the definition of outage probability. Similar performance with respect to ρ and ρ I can be observed. These figures indicate that there is a good match between the analytical result and the Monte-Carlo simulation result. Such matching observations are also illustrated in the following experiments.
Figure 6 shows different trends of outage probability of U 1 , U 2 as increasing power allocation factor a 1 . It is noted that, due to weak users that require higher power allocation factor, it is required that a 1 > 0.5 . As a result, outage behavior happens as a 1 < 0.5 for both users U 1 and U 2 in both cases of transmission SNR ρ . In Figure 6, it is noticeable that a 1 = 1 leads to outage behavior for U 2 too. This figure confirms the optimal outage for user U 2 , i.e., optimal power coefficient a 1 = 0.54 for ρ = 30 ( dB ) and a 1 = 0.6 for ρ = 20 ( dB ) . The reason is that a 1 contributes to varying SINR, and it makes crucial impact on outage performance.
To observe the impact of the target rates R 1 , R 2 , Figure 7 indicates the improved performance for both U 1 , U 2 in Scheme 2 at higher target rates R 1 , R 2 . While the throughput increases too high at highest R 1 = R 2 = 1 among three comparison cases, as in Figure 7, it confirms that the expression of throughput contains both target rates and transmission SNR, hence such throughput performance would change due to the variations of ρ , R 1 , R 2 . However, when ρ is greater than 25 (dB), it leads to a constant throughput. It can be easily seen that ρ = 30 ( dB ) shows the lowest outage performance.
We compare outage performance between Scheme 1 and Scheme 2 in Figure 8. In this experiment, we compared two cases of ρ I , ρ I = 20 ( dB ) and ρ I = 30 ( dB ) . As the previous simulation, the better case is ρ I = 30 ( dB ) . It can be confirmed that Scheme 2 is better than Scheme 1 in terms of outage performance at a higher value of ϵ 1 = ϵ 2 , i.e., ϵ 1 = ϵ 2 > 3 , which shows the performance gap of user U 2 among the two schemes. However, at a lower value of ϵ 1 = ϵ 2 , performance for U 2 does not exist. In contrast, we can always find a performance gap among two schemes for U 1 .
Interestingly, the existence of the D2D in the proposed system does not harm the overall throughput performance of both schemes. This can be confirmed in Figure 9. Of course, R = 1 shows the highest throughput in the three cases. However, as ρ is greater than 25 (dB), it leads to the saturation value of these throughput curves.

6. Conclusions

This paper proposes D2D transmission schemes for CR-NOMA, in which the weak NOMA user cooperates with relay (the strong NOMA user) by exploiting two links. The detailed performance analysis is presented in terms of throughput and outage probability. The closed-form expressions related to these metrics atr derived, and it is shown that a performance gap exists among the two NOMA users. The target rates and power allocation factors give the main impacts on these metrics. In addition, the optimal power allocation factor can be found to obtain optimal outage performance for at least one user in such a NOMA scenario. Simulation results verified the performance analysis, confirming that CR-NOMA works well with the ability of D2D transmission.

Author Contributions

A.-T.L. performed the theoretical analysis, while D.-T.D. provided idea, checked the results and wrote the manuscript. C.-B.L. implemented the simulation and contributed to the manuscript preparation. B.M.L. was responsible for formulating the research issues and revised the paper.

Funding

This work was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (Grant No.: NRF-2017R1D1A1B03028350).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Proposition 1.
Putting Equation (2) into Equation (7), O P U 1 I can be expressed as
O P U 1 I = 1 Pr h 1 2 > θ ρ ¯ S , h S P 2 < ρ I ρ ¯ S + Pr h 1 2 > θ h S P 2 ρ I , h S P 2 > ρ I ρ ¯ S
First, O P U 1 I can be defined as
O P U 1 I = 1 0 ρ I ρ ¯ S f h S P 2 x θ ρ ¯ S f h 1 2 y d y d x + 0 ρ I ρ ¯ S f h S P 2 x θ ρ ¯ S f h 1 2 y d y d x
where ρ I = I t h N 0 stands for the temperature-constraint-to-noise ratio at PD. Thus, with the help of Equations (5) and (6), we can calculate as
O P U 1 I = 1 e θ ρ ¯ S λ 1 1 e ρ I ρ ¯ S λ S P + 1 e ρ I λ 1 + λ S P θ ρ ¯ S λ 1 λ S P
where θ = υ a 1 ε 1 a 2 , υ = ε 1 ξ + 1 and 1 = λ 1 ρ I λ S P θ + λ 1 ρ I .
This is the end of the proof. □

Appendix B

Proof of Lemma 1.
By invoking Equations (2) and (3) into Equation (19), we can express A 1 as
A 1 = Pr ρ ¯ S a 1 h 1 2 ρ ¯ S a 2 h 1 2 + ξ + 1 < ε 1 , ρ ¯ S a 1 h 2 2 ρ ¯ S a 2 h 2 2 + ξ + 1 < ε 1 , ρ ¯ S < ρ I h S P 2 + Pr ρ I a 1 h 1 2 ρ I a 2 h 1 2 + h S P 2 ξ + 1 < ε 1 , ρ I a 1 h 2 2 ρ I a 2 h 2 2 + h S P 2 ξ + 1 < ε 1 , ρ ¯ S < ρ I h S P 2
First, we define the first and second term of Equation (A4) as A 1 , 1 and A 1 , 2 , respectively. In particular, A 1 , 1 is defined as
A 1 , 1 = Pr h 1 2 < θ ρ ¯ S , h 2 2 < θ ρ ¯ S , h S P 2 < ρ I ρ ¯ S
We have
A 1 , 1 = 1 e θ λ 1 ρ ¯ S 1 e θ λ 2 ρ ¯ S 1 e ρ I λ S P ρ ¯ S
Thus, the term A 1 , 2 can be further formulated as
A 1 , 2 = Pr h 1 2 < θ h S P 2 ρ I , h 2 2 < θ h S P 2 ρ I , h S P 2 > ρ I ρ ¯ S
Next, it can be calculated as
A 1 , 2 = ρ I ρ ¯ S f h S P 2 x 0 θ x ρ I f h 1 2 y 0 θ x ρ I f h 1 2 z d z d y d x
Finally, A 1 , 2 is written as
A 1 , 2 = e ρ I ρ ¯ S λ S P 1 e λ S P θ + λ 1 ρ I λ S P λ 1 ρ ¯ S 2 e λ S P θ + λ 2 ρ I λ S P λ 2 ρ ¯ S + 3 e λ S P λ 2 θ + λ S P λ 1 θ + λ 1 λ 2 ρ I λ S P λ 1 λ 2 ρ ¯ S
where 2 = λ 2 ρ I λ S P θ + λ 2 ρ I and 3 = λ 1 λ 2 ρ I λ S P λ 2 θ + λ S P λ 1 θ + λ 1 λ 2 ρ I .
This is the end of the proof. □

References

  1. Mitola, J. Cognitive radio for flexible mobile multimedia communications. Mobile Netw. Appl. 2001, 6, 435–441. [Google Scholar] [CrossRef]
  2. Do, D.-T.; Le, A.-T.; Lee, A.B.M. On Performance Analysis of Underlay Cognitive Radio-Aware Hybrid OMA/NOMA Networks with Imperfect CSI. Electronics 2019, 8, 819. [Google Scholar] [CrossRef]
  3. Pham, M.-N.; Do, D.-T.; Nguyen, T.-T.; Phu, T.-T. Energy harvesting assisted cognitive radio: Random location-based transceivers scheme and performance analysis. Telecommun. Syst. 2018, 67, 123–132. [Google Scholar]
  4. Shen, J.; Liu, S.; Wang, Y.; Xie, G.; Rashvand, H.F.; Liu, Y. Robust energy detection in cognitive radio. IET Commun. 2009, 3, 1016–1023. [Google Scholar] [CrossRef]
  5. Choi, W.; Song, M.-G.; Ahn, J.; Im, G.-H. Soft combining for cooperative spectrum sensing over fast-fading channels. IEEE Commun. Lett. 2013, 18, 193–196. [Google Scholar] [CrossRef]
  6. Liu, X.; Jia, M.; Tan, X. Threshold optimization of cooperative spectrum sensing in cognitive radio networks. Radio Sci. 2013, 48, 23–32. [Google Scholar] [CrossRef]
  7. Liu, X.; Jia, M. Joint optimal fair cooperative spectrum sensing and transmission in cognitive radio. Phys. Commun. 2017, 25, 445–453. [Google Scholar] [CrossRef]
  8. Boccardi, F.; Marzetta, T.L.; Labs, B. Five Disruptive Technology Directions for 5G. IEEE Commun. Mag. 2014, 52, 74–80. [Google Scholar] [CrossRef]
  9. Saito, Y.; Kishiyama, Y.; Benjebbour, A.; Nakamura, T.; Li, A.; Higuchi, K. Non-Orthogonal Multiple Access (NOMA) for Cellular UE2ture Radio Access. In Proceedings of the IEEE 77th Vehicular Technology Conference (VTC Spring), Dresden, Germany, 2–5 June 2013; pp. 1–5. [Google Scholar]
  10. Do, D.-T.; van Nguyen, M.-S.; Hoang, T.-A.; Voznak, M. NOMA-Assisted Multiple Access Scheme for IoT Deployment: Relay Selection Model and Secrecy Performance Improvement. Sensors 2019, 19, 736. [Google Scholar] [CrossRef]
  11. Do, D.-T.; Nguyen, H.-S.; Voznak, M.; Nguyen, T.-S. Wireless powered relaying networks under imperfect channel state information: System performance and optimal policy for instantaneous rate. Radioengineering 2017, 26, 869–877. [Google Scholar] [CrossRef]
  12. Do, D.-T. Energy-Aware Two-Way Relaying Networks under Imperfect Hardware: Optimal Throughput Design and Analysis. Telecommun. Syst. 2015, 62, 449–459. [Google Scholar] [CrossRef]
  13. Do, D.-T. Time Power Switching based Relaying Protocol in Energy Harvesting Mobile Node: Optimal Throughput Analysis. Mob. Inf. Syst. 2015, 2015, 769286. [Google Scholar] [CrossRef]
  14. Nguyen, H.-S.; Do, D.-T.; Nguyen, T.-S.; Voznak, M. Exploiting hybrid time switching-based and power splitting-based relaying protocol in wireless powered communication networks with outdated channel state information. Automatika 2017, 58, 111–118. [Google Scholar] [CrossRef] [Green Version]
  15. Do, D.-T.; Nguyen, H.-S. A Tractable Approach to Analyze the Energy-Aware Two-way Relaying Networks in Presence of Co-channel Interference. EURASIP J. Wirel. Commun. Netw. 2016, 2016, 271. [Google Scholar] [CrossRef]
  16. Do, D.-T. Power switching protocol for two-way relaying network under hardware impairments. Radioengineering 2015, 24, 765–771. [Google Scholar] [CrossRef]
  17. Do, D.-T. Optimal throughput under time power switching based relaying protocol in energy harvesting cooperative networks. Wirel. Pers. Commun. 2016, 87, 551–564. [Google Scholar] [CrossRef]
  18. Do, D.T.; Vaezi, M.; Nguyen, T.L. Wireless Powered Cooperative Relaying using NOMA with Imperfect CSI. In Proceedings of the 2018 IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, UAE, 9–13 December 2018; pp. 1–6. [Google Scholar]
  19. Do, D.-T.; van Nguyen, M.-S. Device-to-device transmission modes in NOMA network with and without Wireless Power Transfer. Comput. Commun. 2019, 139, 67–77. [Google Scholar] [CrossRef]
  20. Nguyen, T.-L.; Do, D.-T. Power Allocation Schemes for Wireless Powered NOMA Systems with Imperfect CSI: System model and performance analysis. Int. J. Commun. Syst. 2018, 31, e3789. [Google Scholar] [CrossRef]
  21. Do, D.-T.; Le, C.-B. Application of NOMA in Wireless System with Wireless Power Transfer Scheme: Outage and Ergodic Capacity Performance Analysis. Sensors 2018, 18, 3501. [Google Scholar] [CrossRef]
  22. Nguyen, T.-L.; Do, D.-T. Exploiting Impacts of Intercell Interference on SWIPT-assisted Non-orthogonal Multiple Access. Wirel. Commun. Mob. Comput. 2018, 2018, 2525492. [Google Scholar] [CrossRef]
  23. Le, C.-B.; Do, D.-T.; Voznak, M. Wireless-powered cooperative MIMO NOMA networks: Design and performance improvement for cell-edge users. Electronics 2019, 8, 328. [Google Scholar] [CrossRef]
  24. Im, G.; Lee, J.H. Outage Probability for Cooperative NOMA Systems With Imperfect SIC in Cognitive Radio Networks. IEEE Commun. Lett. 2019, 23, 692–695. [Google Scholar] [CrossRef]
  25. Li, B.; Qi, X.; Huang, K.; Fei, Z.; Zhou, F.; Hu, Q. Security-Reliability Tradeoff Analysis for Cooperative NOMA in Cognitive Radio Networks. IEEE Trans. Commun. 2019, 67, 83–96. [Google Scholar] [CrossRef]
  26. Xu, W.; Li, X.; Lee, C.-H.; Pan, M.; Feng, Z. Joint Sensing Duration Adaptation, User Matching, and Power Allocation for Cognitive OFDM-NOMA Systems. IEEE Trans. Wirel. Commun. 2018, 17, 1269–1282. [Google Scholar] [CrossRef]
  27. Arzykulov, S.; Tsiftsis, T.A.; Nauryzbayev, G.; Abdallah, M. Outage Performance of Cooperative Underlay CR-NOMA With Imperfect CSI. IEEE Commun. Lett. 2019, 23, 176–179. [Google Scholar] [CrossRef]
  28. Liu, J.; Wu, G.; Xiao, X.; Zhou, X.; Li, G.Y.; Guo, S.; Li, S. Joint Power Allocation and User Scheduling for Device-to-Device-Enabled Heterogeneous Networks With Non-Orthogonal Multiple Access. IEEE Access 2019, 7, 62657–62671. [Google Scholar] [CrossRef]
  29. Kim, H.M.; Nguyen, H.V.; Kang, G.-M.; Shin, Y.; Shin, O.-S. Device-to-Device Communications Underlaying an Uplink SCMA System. IEEE Access 2019, 7, 21756–21768. [Google Scholar] [CrossRef]
  30. Diao, X.; Zheng, J.; Wu, Y.; Cai, Y. Joint Computing Resource, Power, and Channel Allocations for D2D-Assisted and NOMA-Based Mobile Edge Computing. IEEE Access 2019, 7, 9243–9257. [Google Scholar] [CrossRef]
  31. Zheng, H.; Hou, S.; Li, H.; Song, Z.; Hao, Y. Power Allocation and User Clustering for Uplink MC-NOMA in D2D Underlaid Cellular Networks. IEEE Commun. Lett. 2018, 7, 1030–1033. [Google Scholar] [CrossRef]
  32. Zhao, J.; Liu, Y.; Chai, K.K.; Chen, Y.; Elkashlan, M. Joint Subchannel and Power Allocation for NOMA Enhanced D2D Communications. IEEE Trans. Commun. 2017, 65, 5081–5094. [Google Scholar] [CrossRef]
  33. Kazeminia, M.; Tomasin, S.; Mehrjoo, M. Resource Allocation for Uplink NOMA and D2D Links with MLWDF Scheduling Discipline. In Proceedings of the IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Bologna, Italy, 9–12 September 2018; pp. 1–6. [Google Scholar]
Figure 1. System model of CR-NOMA employing D2D link.
Figure 1. System model of CR-NOMA employing D2D link.
Sensors 19 03314 g001
Figure 2. Outage performance of U 1 and U 2 versus ρ with varying R.
Figure 2. Outage performance of U 1 and U 2 versus ρ with varying R.
Sensors 19 03314 g002
Figure 3. Outage performance of U 1 and U 2 versus ρ ¯ S as varying R.
Figure 3. Outage performance of U 1 and U 2 versus ρ ¯ S as varying R.
Sensors 19 03314 g003
Figure 4. Outage performance of U 1 and U 2 versus ρ ¯ S with varying χ .
Figure 4. Outage performance of U 1 and U 2 versus ρ ¯ S with varying χ .
Sensors 19 03314 g004
Figure 5. Outage performance of U 1 and U 2 versus ρ I with varying χ .
Figure 5. Outage performance of U 1 and U 2 versus ρ I with varying χ .
Sensors 19 03314 g005
Figure 6. Outage performance of U 1 and U 2 versus a 1 .
Figure 6. Outage performance of U 1 and U 2 versus a 1 .
Sensors 19 03314 g006
Figure 7. Comparison on two schemes for U 1 , U 2 with varying the target rate ϵ 1 = ϵ 2 .
Figure 7. Comparison on two schemes for U 1 , U 2 with varying the target rate ϵ 1 = ϵ 2 .
Sensors 19 03314 g007
Figure 8. Outage performance of U 1 and U 2 versus the target rate R 1 = R 2 .
Figure 8. Outage performance of U 1 and U 2 versus the target rate R 1 = R 2 .
Sensors 19 03314 g008
Figure 9. Throughput of system versus ρ ¯ S with varying the target rate R 1 = R 2 .
Figure 9. Throughput of system versus ρ ¯ S with varying the target rate R 1 = R 2 .
Sensors 19 03314 g009

Share and Cite

MDPI and ACS Style

Do, D.-T.; Le, A.-T.; Le, C.-B.; Lee, B.M. On Exact Outage and Throughput Performance of Cognitive Radio based Non-Orthogonal Multiple Access Networks With and Without D2D Link. Sensors 2019, 19, 3314. https://doi.org/10.3390/s19153314

AMA Style

Do D-T, Le A-T, Le C-B, Lee BM. On Exact Outage and Throughput Performance of Cognitive Radio based Non-Orthogonal Multiple Access Networks With and Without D2D Link. Sensors. 2019; 19(15):3314. https://doi.org/10.3390/s19153314

Chicago/Turabian Style

Do, Dinh-Thuan, Anh-Tu Le, Chi-Bao Le, and Byung Moo Lee. 2019. "On Exact Outage and Throughput Performance of Cognitive Radio based Non-Orthogonal Multiple Access Networks With and Without D2D Link" Sensors 19, no. 15: 3314. https://doi.org/10.3390/s19153314

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop