Next Article in Journal
Physics Students’ Innovation Readiness for Digital Learning within the University 4.0 Model: Essential Scientific and Pedagogical Elements That Cause the Educational Format to Evolve in the Context of Advanced Technology Trends
Previous Article in Journal
Nonlinear Integer Programming for Solving Preventive Maintenance Scheduling Problem for Cogeneration Plants with Production
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Evaluating the Efficiency of Non-Orthogonal MU-MIMO Methods in Smart Cities Technologies & 5G Communication

1
Department of Electronics and Communication Engineering, Bharat Institute of Engineering and Technology, Hyderabad 501510, Telangana, India
2
Nitte Meenakshi Institute of Technology, Bengaluru 560064, Karnataka, India
3
Department of Electronics and Communication Engineering, Chaitanya Bharathi Institute of Technology (A), Hyderabad 500075, Telangana, India
4
Department of Electronics and Communication Engineering, Centurion University of Technology and Management, Bhubaneswar 752050, Odisha, India
5
School of Engineering, Computing and Informatics, Dar Al-Hekma University, Jeddah 22246, Saudi Arabia
6
Department of Computer Science & Engineering, Rashtrakavi Ramdhari Singh Dinkar College of Engineering, Begusarai 851134, Bihar, India
*
Author to whom correspondence should be addressed.
Sustainability 2023, 15(1), 236; https://doi.org/10.3390/su15010236
Submission received: 14 November 2022 / Revised: 16 December 2022 / Accepted: 17 December 2022 / Published: 23 December 2022

Abstract

:
Many cutting-edge technologies, such as MIMO, cognitive radio, multi-carrier modulation, and network coding, have been proposed for wireless communication to satisfy needs for a higher data rate in the upcoming time, leading to improved quality of service (QoS) regardless of the weather. Orthogonal and non-orthogonal multiple access techniques are two categories into which multiple access technologies can be subdivided. Large networking with effective implementation of wireless devices is supported by non-orthogonal multiple access techniques. Massive NOMA has been implemented to advance access efficiency by permitting several users to share a similar spectrum. Because of the robust co-channel interference between mobile users presented by NOMA, it offers important tasks for system model and resources management. In this study, two additional sets of demanding codes are explored. Multi-user shared access methods and expanded multi-user shared access (EMUSA) methods are both employed. In the MUSA technique, an algorithm is used for the allocation of resources to achieve minimum intercorrelation to the maximum extent in 5G networks. A novel idea proposed in this paper is to create complex codes starting from PN codes (i.e., ePN), thereby achieving promising results in the overall system performance. The first part of this paper describes the fundamental principles of MUSA, and in the next part the main idea of the proposed technique will be studied in detail. Using Monte-Carlo MATLAB simulation, the performance of the suggested approach is assessed in terms of BER vs. SNR. The efficiency of the proposed approach is evaluated in various settings, and the outcomes are contrasted with those of the traditional CDMA technique, using parameters, such as the number of active users and antennas at the receiver.

1. Introduction

The major challenge of future communication networks is to handle the gigantic data traffic that is expected in near future and very low latencies of the order of ns [1,2]. This is due to both the fast-expanding user base that contributes to data traffic and the ongoing development of multimedia online apps. One more important parameter of any communication network is to maintain a very good quality of service (QoS) flexibility to future requirements. To meet the above-mentioned requirements along with higher spectral efficiency, NOMA is a promising technique in future communication networks, and this is also one of the new 5G standards [3,4]. As mentioned earlier, there are two types of multiple access techniques: (1) OMA and (2) NOMA.
An orthogonal multiple access technique presupposes that all of the signals arriving from various users are orthogonal to one another in terms of both time and frequency as well as code. In comparison to orthogonal multiple access, which utilizes the frequency or time domains, non-orthogonal multiple access employs the code or power domain. WCDMA, TDMA, and FDMA are the other categories into which multiple access technologies can be subdivided. This leads to a perfect receiver where all the unwanted noise signals are separated from the desired signals [5]. The orthogonality is more effective when the communication network is under load, i.e., more block resources are available than there are active users [6]. OFDMA, CDMA, FDMA, and TDMA are a few of the OMA techniques that are frequently employed in communication networks. In OMA techniques single users can be accommodated using the same time or frequency response to reduce inter-user interface (IUI). Moreover, OMA techniques offer satisfactory levels of IUI under normal standards [7].
By multiplexing all the codes or domains to reduce IUI, NOMA, in contrast to OMA, permits several users within the identical cell, within the identical time or frequency response block. The multiplexing in the code domain that is unique to each user is made possible by the spreading sequence employed in code domain NOMA techniques [8]. Some of the code domain NOMA techniques are my IDMA, sequence-based CDMA, and low-density signature (LDS). Some other techniques are diligently linked to NOMA are pattern division multiple access (PDMA), RSMA, MUSA SCMA, and LPMA.
Using the simple design of the receiver orthogonal multiplexing offers moderate performance in terms of throughputs in packet-based networks. To achieve better efficiency, more capacity improvement in future network design is required using non-orthogonal multiplexing. Furthermore, it should be emphasized NOMA composed with OMA achieves more capacity, but NOMA offers a better trade-off between system capacity and IUI which are important communication network parameters [9,10,11].
In this paper, the study of uplink performance is carried out which uses the NOMA technique along with MIMO Technology. In the uplink of the MUSA technique, the complex spreading sequence is used to spread the symbol of each user before transmission. For each sent symbol, a spreading sequence will be chosen at random by all users from a pool of spreading sequences. When utilized in conjunction with SIC at the receiver to attain low cross connection, the spread sequences are of a short length and more effective. In [12], the comparison of two NOMA techniques viz. SCMA and PDMA are presented in terms of SNR and BER. It can be concluded at this point that, the SCMA performs well than MUSA & PDMA due to the optimal design of code blocks [13]. In [14], when QPSK modulation and coding rates are utilized at the receiver, it is analyzed how spreading codes with pseudo-random noise (PN) codes function over time. Further, when LTE’s block error rate (BLER) is compared with that of one of the NOMA techniques, MUSA, it is discovered that there is no performance degradation. On the transmitting end, simple antennas, and on the receiving end numerous antennas are considered for this proposed work, which results in MIMO technology [15,16]. Instead of direct communication from source to destination, a relay is introduced between source and destination, i.e., decode-and-forward (DF) method for better coverage in a shared environment of the communication network. Two new sets of complex spread codes are introduced with an algorithm that reduces the interconnection as much as possible. A novel approach to creating complex codes starts from PN codes proposed in this paper and it is also proven that the results are promising. The performance of this novel approach is evaluated in terms of SNR and BER using Monte Carlo MATLAB simulations. It is discovered that there is no performance degradation when comparing the block error rate (BER) of one NOMA approach, MUSA, with LTE.
Two further sets of difficult codes are investigated in this paper. Both enlarged multi-user shared access techniques and multi-user shared access (EMUSA) methods are used. In the MUSA approach, a resource allocation process is employed to achieve the smallest possible intercorrelation in 5G networks. The creation of complex codes starting from PN codes (i.e., ePN) is a unique notion put forward in this study, and it has the potential to provide positive outcomes in terms of system performance. The basic concepts of MUSA are described in the first section of this essay, and the core notion of the suggested approach will be thoroughly examined in the section that follows. The effectiveness of the recommended technique is evaluated using Monte-Carlo MATLAB simulations in terms of BER vs. SNR.

2. Schematic Model of Novel Approach

In this part, we will describe and explain the proposed schematic model of the novel approach briefly.
Take into account a single-cell communication network with a K number of users, one relay, and a single BTS. All the K users are multiplexed using different codes, the number of antennas equipped by K users is denoted Nr, the number of antennas at BTS is given by Nt, and the relay is prepared with Nrr antennas at the receiver along with Ntr antennas at the transmitter [5,17,18,19]. At the relay, the delay and forward (DF) protocol will be used. Additionally, it is assumed that each channel is a Rayleigh fading channel that is identically independent and distributed (i.i.d). Figure 1 below displays the schematic flowchart of the novel method.
The binary data input sequence is passed into LDPC coding at the transmitter before being modulated using BPSK or QPSK methods. The input is then switched from series to parallel before being sent to the IFFT block, parallel to series, and cyclic prefix. Additionally, exact reverse operations are carried out at the receiver to produce the output of the sum-product algorithm (SPA).

2.1. Coding and Decoding Algorithm Using LDPC

In this section, LDPC codes and simplified SPA algorithms are studied which will be used for LDPC decoders.
(a)
LDPC codes
The input sequence of length ‘K’ is converted to a code word of length ‘n’ using some rules in channel codes at channel coding. The code word is a block code with ‘n’ symbols. It is derived from the channel encoder with a block code (n,k) by adding (n-k) redundant algebraically with ‘K’ symbols [6,20,21,22]. The block codes are linear in general and hence reduced complexity in encoding and also have systematic structure. The message symbol ‘K’ remains unchanged in the encoding process and redundant parity check symbols (n-k) are added to message symbols.
The generator matrix G of (k × n) dimension associated with linear block codes is given by
G = g 0 g 1 g k 1
To conclude the encoding procedure, it will be multiplied by the message vector “m”. The message vector is provided by
m = m 0 ,   m 1 ,   m k 1 ,
Then, the code word can be written as
c = m G
Therefore, the code word is k base vectors combined linearly in this way gi, i = 0,1,2…, k − 1 and a block code G(n × k), it is given by
G = I k | P
c = m | b = m I k | P
Since an extremely sparse parity check matrix defines LDPC codes, they are linear block codes (i.e., only a small number of ones in respective rows and columns). LDPC codes used in this study have a set number of ones in each row and column. A signal constellation marked by the letters “M” and “vectors” is used to map the code word obtained after LDPC coding.
This study employs binary phase shift keying as
M = (−1, 1)
Quadrature phase shift keying
M = (1 + I, 1 − I, −1 + I, −1 − i)
signals are implemented.
(b)
Decoders
The soft decision algorithm used by the decoder is simply SPA, and it takes the probability of each received bit as input. This algorithm changes data iteratively amongst the checking node ‘m’ and varying node ‘n’ using a parity check matrix. The SPA algorithm uses an iteration process, and it is given below.
  • Initialize variable notes
  • Evaluate variable node ‘n’ and update all incoming messages.
  • Variable node updation
  • Decision-making from Step 2
The hyperbolic tangent and hyperbolic arc tangent functions are the foundation of the SPA method with good BER performance to estimate the check node update. As a result, out of the four phases in the LDPC decoding technique, the check node update has the highest computing complexity.
This SPA algorithm needs more computations because of the maximum number of multiplications and divisions and hence it is more complex. Therefore, this SPA algorithm is replaced by the simple version of SPA which uses additions and subtractions. This simplified SPA algorithm is used in this paper to decode the data at the receiver.

2.2. OFDM Method

The orthogonal frequency division multiplexing (OFDM) technique is used to transmit the large number of high data rate subcarriers which are closely spaced and also orthogonal with all parallelly. The schematic illustration of the OFDM method is as already displayed in Figure 1.
The input data symbols are complex in nature and represent modulation constellation points. The input symbols are coded using LDPC coding and modulated using QPSK/BPSK. After that, it is converted to parallel data and the IFFT algorithm is applied, which converts from the frequency domain to the time domain.
The OFDM complex signal can be written in the time domain as
s b b t = l = 0 L 1 s l t e j l w l
ω l = 2 π f l = 2 π   T O F D M
fl = f0 + Δω
where f0 is carrier frequency and Δω sub-carrier spacing.
The shortest subcarrier spacing can be expressed as
ω l + 1 ω l = Δ ω = 2 π   T O F D M
To avoid the possibility of inter-symbol interference (ISI), a guard interval is appended at the beginning of each OFDM symbol, which is known as a cyclic prefix. The OFDM symbol is filled with a null signal to create a guard interval [23,24,25]. While maintaining the orthogonality of the subcarriers, the length of the symbol is enhanced with Tcp; (i.e., TOFDM + Tcp).
The output symbol of the OFDM transmitter after transmitting the OFDM symbol on a carrier with frequency f0 can be expressed as
s c p t =   Re sbb t e j 2 π f 0
At the OFDM receiver, the exact reverse operation is performed, removing the guard interval and switching from serial to parallel, respectively [26]. This stream is used by the FFT technique to convert the signal’s time domain into its frequency domain [27]. The original data symbol is retrieved after using a parallel-to-serial converter.
Multiple Access Technology:
Multiple access approaches are utilized to increase the user’s number at any given time interval while keeping acceptable SINR restrictions.
In order to reduce multi-user interference, perfectly orthogonal signals must be transmitted by all the different users [28,29,30]. Numerous multiple access techniques are used based on their performance in terms of low cross-correlation minimum code length, spectrum spreading efficiency, and system complexity.
Among the best, perfectly orthogonal codes is zero-related Walsh codes, which can be generated easily at higher rates, thereby being best suitable for communication networks with more users [31]. However, the drawback of Walsh codes is they are limited and hence the number of users also will be limited. Another drawback of the Walsh code is non-uniform spectrum spreading.
On the other hand, despite the PN codes’ imperfect orthogonality, they can achieve low intercorrelation with other codes when used with the appropriate latency. The PN codes have the best uniform spreading properties within channel bandwidth (BW). Both Walsh and PN codes are best suitable to achieve better performance in multiple access techniques, but computational complexity is greater at the receiver [32,33,34]. For higher data rate users, channel distortion and fading lead to increased complexity, and to minimize fading and channel distortion, equalization techniques must be used at the receiver, which again leads to higher complexity and cost along with high power consumption [35].
To overcome these drawbacks, CDMA techniques are used. Multiuser shared access (MUSA), one of them, utilises compact spreading codes for complicated values. Cross-correlation is lesser as compared to PN codes with the capacity of supporting more users because of its imaginary component. The MUSA symbols are non-binary and facilitate robust SIC.
Complex spreading codes, such as binary codes, are made up of several different components. L stands for spreading code length, and a maximum of 4L power codes can be produced [36]. For instance, there are 256 potential codes for a length of 4, which is insufficient for large-capacity networks. Therefore, to expand the set, instead of (−1,1), elements of complex spreading codes (1 + i, 1 − i, −1 + i, −1 − i) have been utilized [37,38,39]. That means a total of 9L codes are possible and best suitable for networks with a high number of users. Each component of the sophisticated spreading code is present in this collection and can be used instead of {1, 0, 1}, {2, 1, 0, 1, 2} in situations when there are a lot of users.
In this study, the following codes consider are (−1, −1 − i, −1 + i, −i, 0, i, 1, 1 − i, 1 + i) for implementation.
As illustrated in (13) and (14), one can obtain groups of three orthogonal codes for length 4 and a minimum of 16 spreading codes having low correlation. As illustrated in (15) and (16), respectively, if the length is raised to 8, 7 orthogonal and 32 low correlated codes can be obtained [40].
  i i 1 + i i i 1 i i 1 + i 1 i 1 i 1
i i i i i i i i i i i i i i i i i i i i 1 + i 1 + i 1 + i 0 1 i 1 i i 1 + i 0 1 + i 1 + i 1 + i i i i i 0 1 + i i 1 + i i i 1 + i 1 + i 1 i i i i i 0 0 0 0 0 0 i 1 + i 1 + i i 0 0 i 1 i 1 i
i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i
A Novel algorithm for generating Complex spreading codes is shown below.
1 1 1 1 1 1 1 1 1 1 1 1 1 1 i i i 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 i i i i i 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 i i 1 i i i i i i i i i i i 1 1 1 1 1 1 1 1 1 1 i 1 i i i i 1 1 1 1 1 i i 1 1 1 1 i 1 i i i i i 1 1 i i i i 1 i i i i 1 1 1 1 i i 1 i 1 i 1 1 i i 1 i i i i i 1 i i 1 1 i i i 1 i 1 1 i 1 1 i 1 1 1 i i i i i i i i 1 1 1 i i 1 i 1 1 i 1 1 i 1 1 1 i i i 1 i i i i 1 1 1
  • Decide the length of spread codes based on no. of users
  • Define the values set (−1, 0, 1)
  • Generate Matrix
  • Find out inter-correlation
  • Identify zero values
  • Generate Matrix which includes all zero correlation
  • Finish the matrix using (6)
  • Assign codes to different users
The next algorithm for generating pseudo-noise (PN) codes is shown below.
  • Decide the degree of polynomial based on users
  • Find out the length of polynomial
  • Select the generating polynomial
  • Establish a matrix that generates PN code
  • Create a collection of intricate PN codes with actual and fictitious parts.
  • Cross verify inter-correlation
  • Assign codes to users.

2.3. Transmission Using Relay

The following Figure 2 shows the proposed relay transmission network. The relay is used to minimize interference among active users by treating them as separate connections. There are two paths if you use a relay, one of the paths is the direct propagation path and the other is the indirect propagation path depending on the relays [41]. The noise present in the channel is thought to be AWGN [42,43,44].
The signal received by the relay path can be written as
y S R , k = P J k s k + n S R , k         k = 1 , 2 ,     ,   K
Then, the receiver signal is given by
y S D , k = k = 1 k = K P H k   S k + n S D , k      
where P—transmitted signal power
sk—spread MUSA signal
nSD,—gaussian noise vector
Hk—channel matrix
The received signal from the relay station computed as,
y R D = k = 1 K P ~ r F k   y S R , k   + n R D , k
P + Pr = 1
where Pr—transmitted power from relay
Fk—channel matrix
nRD,—gaussian noise vector
At the BTS, to recover the original signal from two synchronous signals, the maximum ratio combining is used. Then, the output of MRC is given by
y   =   α 1 y S D + α 2 y R D  
The channel coefficients α1 and α2 are given by
α 1 = P H k * σ S D , k
α 2 = P r F k * σ S D , k 2

3. Simulation Outputs

In this part, the performance results achieved by the proposed novel technology are discussed in detail. To obtain a higher degree of confidence in the simulation outputs, extensive simulations have been carried out using MATLAB along with Monte Carlo simulations. Table 1 provides an overview of the simulation parameters.
The performance of massive MIMO networks in uplink using Walsh codes, PSN codes, and also with Complex spreading codes [45]. The performance of MIMO networks of configuration (1 × 26 × 30) (1 × 30 × 30) at relay using QPSK modulation technique in a channel with Rayleigh fading and Walsh codes of length 64 is shown in Figure 3.
From Figure 3, it is evident that BER is decreased when the users are fewer because of the sharing of resources. Moreover, the performance of the memo networks is enhanced by the special diversity for reliable communication [46].
The simulation results of MIMO networks when the PN codes of length 63 are used are shown in Figure 4. It can be observed the performance is degraded when pin codes are used because they are not perfectly orthogonal. However, PN codes can offer superior spectrum spreading [47]. Therefore, the optimal decision should be taken taking BER values and receiver complexity into account.
Table 2 presents simulation results when Walsh codes and PN codes are used in MIMO networks for SNR = 12 dB.
In the simulation of MUSA technology, the considered code length is 8 and there are 32 codes with low correlation parameters from Equation (16). The MUSA set and 25 codes in ascending order from the matrix provided by (16) with low correlation are selected from the set. The remaining seven codes are replaced by zero cross-correlation codes.
It is possible to demonstrate the EMUSA sets, as predicted, had a lesser BER than the MUSA set at the identical SNR, with the improvements becoming further pronounced as the SNR rose. As opposed to that, the system rate improved fourfold, resulting in higher spectrum occupancy and more receiver complexity. Therefore, a trade-off between processing complexity and necessary performance levels must be negotiated, based on the application.
It can be observed that BER values decrease with SNR and low BER values, i.e., best performance results are obtained using MUSA technology.
We attempted to compare our findings with the equivalent model in the published literature in order to assess the effectiveness of the current strategy. Therefore, at the receiver, utilizing an MMSE-SIC detector and distinct quantities of antennas at the receiver and transmitter, the authors of [48] acquired numerous outcomes in somewhat equivalent circumstances to our approach, but with our configuration, we achieved BER less than 103 in all configurations. In contrast, the authors’ setup achieved an estimated rate for BER of 5102 for SNR, for 12 dB. The findings were somewhat superior to MUSA but inferior to MUSA0 in [45], where the authors estimated the value of BER to be 104 at an SNR of 12 dB.

4. Conclusions and Future Scope

The performance of large MIMO is examined in this research. Networks in the uplink direction along with the relay are studied when LDPC coding and complex spreading codes of MUSA, MUSA0, EMUSA, and EMUSA0 are used.
Hence, 32 codes with low correlation are chosen for the MUSA collection. Additionally, for MUSA0, seven‘ codes with zero cross-correlation and the top 25 codes are chosen in increasing order of their intercorrelation. The results are noted when QPSK modulation and Rayleigh fading channel are used for a MIMO network with a configuration (1 × 26 × 30) and (1 × 30 × 30) and 26, 30 antennas at the relay [49].
Walsh and PN codes that are more traditional are contrasted with the performance outcomes of the MUSA approach. The number of antennas to be employed at the relay and the receiver at the destination is also studied. Out of the available options, the best choice is selected considering BER, spectral behavior, and receiver complexity.
The study also includes complex spreading codes (ePN), which are produced from PN spreading codes. Promising results are achieved in terms of very low BER values, lower number of antennas, as well as reduced overall system cost. In the future, the implementation of more relays in massive MIMO networks between source and destination should be investigated when DF and amplify and forward (AF) protocols are used.

Author Contributions

Methodology, P.D. and J.R.; Software, S.P.S.; Formal analysis, V.S.; Resources, V.K.M.; Supervision, H.C.M., S.M. and S.B.H.S. All authors have read and agreed to the published version of the manuscript.

Funding

The study was funded by the Vice Presidency for Graduate Studies, Business, and Scientific Research (GBR) at Dar Al Hekma University, Jeddah, Saudi Arabia. The authors extend their sincere gratitude and thanks to Dar Al Hekma University for its support.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

On request, the corresponding author will provide the data that back up the study’s findings.

Conflicts of Interest

The authors certify that they have no financial or other conflicting interest to disclose with relation to the current work.

References

  1. Dai, L.; Wang, B.; Yuan, Y.; Han, S.; Chih-lin, I.; Wang, Z. Nonorthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends. IEEE Commun. Mag. 2015, 53, 74–81. [Google Scholar] [CrossRef]
  2. Yuan, Y.; Yuan, Z.; Yu, G.; Hwang, C.-h.; Liao, P.-k.; Li, A.; Takeda, K. Non-orthogonal transmission technology in LTE evolution. IEEE Commun. Mag. 2016, 54, 68–74. [Google Scholar] [CrossRef]
  3. Sun, Y.; Ng, D.W.K.; Ding, Z.; Schober, R. Optimal joint power and subcarrier allocation for full-duplex multicarrier non-orthogonal multiple access systems. IEEE Trans. Commun. 2017, 65, 1077–1091. [Google Scholar] [CrossRef] [Green Version]
  4. Fang, F.; Zhang, H.; Cheng, J.; Roy, S.; Leung, V.C.M. Joint user scheduling and power allocation optimization for energy-efficient NOMA systems with imperfect CSI. IEEE J. Sel. Areas Commun. 2017, 35, 2874–2885. [Google Scholar] [CrossRef]
  5. Li, A.; Lan, Y.; Chen, X.; Jiang, H. Non-orthogonal multiple access (NOMA) for future downlink radio access of 5G. China Commun. 2015, 12, 28–37. [Google Scholar] [CrossRef]
  6. Higuchi, K.; Benjebbour, A. Non-orthogonal multiple access (NOMA) with successive interference cancellation for future radio access. In Proceedings of the 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), Dresden, Germany, 2–5 June 2013; pp. 403–414. [Google Scholar]
  7. Nguyen, H.V.; Kim, H.M.; Kang, G.-M.; Nguyen, K.-H.; Bui, V.-P.; Shin, O.-S. A Survey on Non-Orthogonal Multiple Access: From the Perspective of Spectral Efficiency and Energy Efficiency. Energies 2020, 13, 4106. [Google Scholar] [CrossRef]
  8. Islam, S.M.R.; Avazov, N.; Dobre, O.A.; Kwak, K.-S. Power-domain non-orthogonal multiple access (NOMA) in 5G systems: Potentials and challenges. IEEE Commun. Surveys Tuts. 2017, 19, 721–742. [Google Scholar] [CrossRef] [Green Version]
  9. Akbar, A.; Jangsher, S.; Bhatti, F.A. NOMA and 5G emerging technologies: A survey on issues and solution techniques. Comput. Netw. 2021, 190, 107950, ISSN 1389-1286. [Google Scholar] [CrossRef]
  10. Dai, L.; Wang, B.; Ding, Z.; Wang, Z.; Chen, S.; Hanzo, L. A survey of non-orthogonal multiple access for 5G. IEEE Commun. Surveys Tuts. 2018, 20, 2294–2323. [Google Scholar] [CrossRef] [Green Version]
  11. Sun, Y.; Ng, D.W.K.; Ding, Z.; Schober, R. Optimal joint power and subcarrier allocation for MC-NOMA systems. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar]
  12. He, J.; Tang, Z.; Che, Z. Fast and efficient user pairing and power allocation algorithm for non-orthogonal multiple access in cellular networks. Electron. Lett. 2016, 52, 2065–2067. [Google Scholar] [CrossRef]
  13. Ali, S.; Hossain, E.; Kim, D.I. Non-orthogonal multiple access (NOMA) for downlink multiuser MIMO systems: User clustering, beamforming, and power allocation. IEEE Access 2017, 5, 565–577. [Google Scholar] [CrossRef]
  14. Fu, Y.; Chen, Y.; Sung, C.W. Distributed downlink power control for the non-orthogonal multiple access system with two interfering cells. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 22–27 May 2016; pp. 1–6. [Google Scholar]
  15. Li, A.; Benjebbour, A.; Harada, A. Performance Evaluation of nonorthogonal multiple access combined with opportunistic beamforming. In Proceedings of the 2014 IEEE 79th Vehicular Technology Conference (VTC Spring), Seoul, Republic of Korea, 18–21 May 2014; pp. 1–5. [Google Scholar]
  16. Chen, Z.; Ding, Z.; Dai, X. Beamforming for Combating Inter-cluster and Intra-cluster Interference in Hybrid NOMA Systems. IEEE Access 2016, 4, 4452–4463. [Google Scholar] [CrossRef]
  17. Jiang, X.; Lu, H.; Chen, C.W. Enabling quality-driven scalable video transmission over multi-user NOMA system. In Proceedings of the IEEE INFOCOM 2018—IEEE Conference on Computer Communications, Honolulu, HI, USA, 16–19 April 2018; pp. 1–9. [Google Scholar]
  18. Kumar, S.; Srivastava, P.K.; Pal, A.K.; Mishra, V.P.; Singhal, P.; Srivastava, G.K.; Mamodiya, U. Protecting location privacy in cloud services. J. Discret. Math. Sci. Cryptogr. 2022, 25, 1053–1062. [Google Scholar] [CrossRef]
  19. Çalhan, A.; Cicioğlu, M. Handover scheme for 5G small cell networks with non-orthogonal multiple access. Comput. Netw. 2020, 183, 107601, ISSN 1389-1286. [Google Scholar] [CrossRef]
  20. Higuchi, K. NOMA for Future Cellular Systems. In Proceedings of the 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), Montreal, QC, Canada, 18–21 September 2016; pp. 1–5. [Google Scholar] [CrossRef]
  21. Luo, F.; Zhang, C. Non-orthogonal multiple access (NOMA): Concept and design. In Signal Processing for 5G: Algorithms and Implementations; Wiley: Hoboken, NJ, USA, 2016; pp. 143–167. [Google Scholar]
  22. Nonaka, N.; Kishiyama, Y.; Higuchi, K. Non-orthogonal multiple access using intra-beam superposition coding and SIC in base station cooperative MIMO cellular downlink. In Proceedings of the 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), Vancouver, BC, Canada, 14–17 September 2014; pp. 1651–1659. [Google Scholar]
  23. Sun, Q.; Han, S.; Xu, Z.; Wang, S.; Chih-lin, I.; Pan, Z. Sum rate optimization for MIMO non-orthogonal multiple access systems. In Proceedings of the 2015 IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, LA, USA, 9–12 March 2015; pp. 747–752. [Google Scholar]
  24. Priyanka, P.; Singhai, R.; Shukla, P. Design and implementation of optimum LSD coded signal processing algorithm in the multiple-antenna system for the 5G wireless technology. Wirel. Commun. Mob. Comput. 2022, 2022, 7628814. [Google Scholar]
  25. Chen, Z.; Dai, X. MED precoding for multiuser MIMO-NOMA downlink transmission. IEEE Trans. Veh. Technol. 2017, 66, 5501–5505. [Google Scholar] [CrossRef]
  26. Kamayani, S.; Yadav, R.P.; Jain, K.C. Cyclic gradient descent optimization for joint MAP estimation of channel and phase noise in orthogonal frequency division multiplexing. IET Commun. 2018, 12, 1485–1490. [Google Scholar]
  27. Ding, Z.; Adachi, F.; Poor, H.V. The Application of MIMO to Non-Orthogonal Multiple Access. IEEE Trans. Wirel. Commun. 2016, 15, 537–552. [Google Scholar] [CrossRef] [Green Version]
  28. Timotheou, S.; Krikidis, I. Fairness for Non-Orthogonal Multiple Access in 5G Systems. IEEE Signal Process. Lett. 2015, 22, 1647–1651. [Google Scholar] [CrossRef] [Green Version]
  29. Islam, S.M.R.; Zeng, M.; Dobre, O.A.; Kwak, K.-S. Resource allocation for downlink NOMA systems: Key techniques and open issues. IEEE Wireless Commun. 2018, 25, 40–47. [Google Scholar] [CrossRef] [Green Version]
  30. Kumar, S.; Dubey, K.K.; Gautam, A.K.; Verma, S.; Kumar, V.; Mamodiya, U. Detection of recurring vulnerabilities in computing services. J. Discret. Math. Sci. Cryptogr. 2022, 25, 1063–1071. [Google Scholar] [CrossRef]
  31. Kamayani, S.; Yadav, R.P.; Jain, K.C. Joint MAP channel estimation and data detection for OFDM in presence of phase noise from free running and phase locked loop oscillator. Digit. Commun. Netw. 2021, 7, 55–61. [Google Scholar]
  32. Ali, M.S.; Tabassum, H.; Hossain, E. Dynamic user clustering and power allocation for uplink and downlink non-orthogonal multiple access (NOMA) systems. IEEE Access 2016, 4, 6325–6343. [Google Scholar] [CrossRef]
  33. Shahab, M.B.; Kader, M.F.; Shin, S.Y. A virtual user pairing scheme to optimally utilize the spectrum of unpaired users in nonorthogonal multiple access. IEEE Signal Process. Lett. 2016, 23, 1766–1770. [Google Scholar] [CrossRef]
  34. Kaur, M.; Singh, D.; Kumar, V.; Gupta, B.B.; El-Latif, A.A.A. Secure and Energy Efficient-Based E-Health Care Framework for Green Internet of Things. IEEE Trans. Green Commun. Netw. 2021, 5, 1223–1231. [Google Scholar] [CrossRef]
  35. Mohanta, H.C.; Geetha, B.T.; Alzaidi, M.S.; Dhanoa, I.S.; Bhambri, P.; Mamodiya, U.; Akwafo, R. An Optimized PI Controller-Based SEPIC Converter for Microgrid-Interactive Hybrid Renewable Power Sources. Wirel. Commun. Mob. Comput. 2022, 2022, 6574825. [Google Scholar] [CrossRef]
  36. Al-Abbasi, Z.Q.; So, D.K.C. User-pairing based non-orthogonal multiple access (NOMA) system. In Proceedings of the 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), Nanjing, China, 15–18 May 2016; pp. 1–5. [Google Scholar]
  37. Datta, S.N.; Kalyanasundaram, S. Optimal power allocation and user selection in non-orthogonal multiple access systems. In Proceedings of the 2016 IEEE Wireless Communications and Networking Conference, Doha, Qatar, 3–6 April 2016; pp. 1–6. [Google Scholar]
  38. Cai, W.; Chen, C.; Bai, L.; Jin, Y.; Choi, J. Subcarrier and power allocation scheme for downlink OFDM-NOMA systems. IET Signal Process. 2017, 11, 51–58. [Google Scholar] [CrossRef]
  39. Liu, X.; Wang, X. Efficient Antenna Selection and User Scheduling in 5G Massive MIMO-NOMA System. In Proceedings of the 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), Nanjing, China, 15–18 May 2016; pp. 1–5. [Google Scholar]
  40. Saito, Y.; Benjebbour, A.; Kishiyama, Y.; Nakamura, T. Systemlevel performance evaluation of downlink non-orthogonal multiple access (NOMA). In Proceedings of the 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), London, UK, 8–11 September 2013; pp. 611–615. [Google Scholar]
  41. Saito, Y.; Kishiyama, Y.; Benjebbour, A.; Nakamura, T.; Li, A.; Higuchi, K. Non-orthogonal multiple access (NOMA) for cellular future radio access. In Proceedings of the 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), Dresden, Germany, 2–5 June 2013; pp. 1–5. [Google Scholar]
  42. Priyanka, P.; Singhai, R.; Shukla, P.; Singhai, J. Realization of New Radio 5G-IoT Connectivity Using mmWave-Massive MIMO Technology. In 5G and Beyond; Chapman and Hall/CRC: Boca Raton, FL, USA, 2022; pp. 69–89. [Google Scholar]
  43. Balyan, V. Cooperative relay to relay communication using NOMA for energy efficient wireless communication. Telecommun. Syst. 2021, 77, 271–281. [Google Scholar] [CrossRef]
  44. Alzaidi, M.S.; Subbalakshmi, C.; Roshini, T.V.; Shukla, P.K.; Shukla, S.K.; Dutta, P.; Alhassan, M. 5G Telecommunication Allocation Network using IoT Enabled Improved Machine Learning Techniques. Wirel. Commun. Mob. Comput. 2022, 2022, 6229356. [Google Scholar] [CrossRef]
  45. Asim, A.; Seet, B.-C.; Hasan, M.A.; Li, X.J. A survey on the application of non-orthogonal multiple access to different wireless networks. Electronics 2019, 8, 1355. [Google Scholar]
  46. Yuan, Z.; Hu, Y.; Li, W.; Dai, J. Blind Multi-User Detection for Autonomous Grant-Free High-Overloading Multiple-Access without Reference Signal. In Proceedings of the 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal, 3–6 June 2018; pp. 1–7. [Google Scholar]
  47. Yuan, Z.; Li, W.; Hu, Y.; Tang, H.; Dai, J.; Ma, Y. Blind Multi-user Detection Based on Receive Beamforming for Autonomous Grant-Free High-Overloading Multiple Access. In Proceedings of the 2019 IEEE 2nd 5G World Forum (5GWF), Dresden, Germany, 30 September–2 October 2019; pp. 520–523. [Google Scholar]
  48. Ding, Z.; Fan, P.; Poor, H.V. Impact of User Pairing on 5G Nonorthogonal Multiple-Access Downlink Transmissions. IEEE Trans. Veh. Technol. 2016, 65, 6010–6023. [Google Scholar] [CrossRef]
  49. Dutta, P.; Manna, G.C. Designing a Cognitive Radio with Enhancement in Throughput and Improved Spectrum Sensing Technique. In Proceedings of the 2016 2nd International Conference on Control Science and Systems Engineering (ICCSSE), Singapore, 27–29 July 2016. [Google Scholar]
Figure 1. The schematic block diagram of the Novel technique.
Figure 1. The schematic block diagram of the Novel technique.
Sustainability 15 00236 g001
Figure 2. The schematic illustration of the proposed Technique.
Figure 2. The schematic illustration of the proposed Technique.
Sustainability 15 00236 g002
Figure 3. Number of UEs with collision probability.
Figure 3. Number of UEs with collision probability.
Sustainability 15 00236 g003
Figure 4. Access success probability vs. no. of UEs.
Figure 4. Access success probability vs. no. of UEs.
Sustainability 15 00236 g004
Table 1. Simulation Parameters.
Table 1. Simulation Parameters.
ParameterTechniqueValue
Channel CodingLDPC1/2
ModulationQPSK-
ChannelRayleigh-
FFT size-64
Number of Data Subcarriers-52
Walsh64 Length
Multiple AccessPN64 Length
MUSA8 Length
Signal to Noise Ratio-1–20 dB
Number of Users-12,16
User Overload-150%,200%
MIMO configurations-(1 × 6 × 30)
(Nt × N rr × Nr)-(1 × 30 × 30)
DetectorsMMSE-
Table 2. BER vs SNR for Walsh and PN spreading codes for SNR = 12 dB.
Table 2. BER vs SNR for Walsh and PN spreading codes for SNR = 12 dB.
(1 × 26 × 30)
K = 12
(1 × 30 × 30)
K = 12
(1 × 26 × 30)
K = 16
(1 × 30 × 30)
K = 16
Walsh0.00065930.00010830.0046570.001864
PN0.0015930.00059980.0064060.00559
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Dutta, P.; Ramyasree, J.; Sridhar, V.; Minchula, V.K.; Mohanta, H.C.; Mahfoudh, S.; Shah, S.B.H.; Singh, S.P. Evaluating the Efficiency of Non-Orthogonal MU-MIMO Methods in Smart Cities Technologies & 5G Communication. Sustainability 2023, 15, 236. https://doi.org/10.3390/su15010236

AMA Style

Dutta P, Ramyasree J, Sridhar V, Minchula VK, Mohanta HC, Mahfoudh S, Shah SBH, Singh SP. Evaluating the Efficiency of Non-Orthogonal MU-MIMO Methods in Smart Cities Technologies & 5G Communication. Sustainability. 2023; 15(1):236. https://doi.org/10.3390/su15010236

Chicago/Turabian Style

Dutta, Papiya, Jvl Ramyasree, V. Sridhar, Vinodh Kumar Minchula, Harish Chandra Mohanta, Saoucene Mahfoudh, Syed Bilal Hussain Shah, and Santar Pal Singh. 2023. "Evaluating the Efficiency of Non-Orthogonal MU-MIMO Methods in Smart Cities Technologies & 5G Communication" Sustainability 15, no. 1: 236. https://doi.org/10.3390/su15010236

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop