Научная статья на тему 'HYBRID-NOMA FOR WIRELESS COMMUNICATION SYSTEM'

HYBRID-NOMA FOR WIRELESS COMMUNICATION SYSTEM Текст научной статьи по специальности «Электротехника, электронная техника, информационные технологии»

CC BY
35
14
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
DYNAMIC POWER / GENETIC ALGORITHM / HYBRID CONSTELLATION SHAPING / MACHINE LEARNING / NOMA / WIRELESS COMMUNICATION

Аннотация научной статьи по электротехнике, электронной технике, информационным технологиям, автор научной работы — Khan R.

The demand for spectral efficiency, security, energy efficiency, power efficiency, high data rate, and throughput increases with the advancement of wireless communication systems. Power domain non-orthogonal multiple access (NOMA) is one the famous algorithms to achieve the essential requirement of a wireless communication setup. This paper proposes a novel algorithm called hybrid NOMA (H-NOMA). The hybrid NOMA can improve power efficiency (PE), spectral efficiency (SE), symbol error rate (SER), and sum secrecy. It is based on Hybrid Constellation Shaping to support a wireless communication system. Security is another primary concern for all communication systems; the proposed H-NOMA also provides better secrecy capacity as compared to NOMA. This paper contains the basic structure of the proposed algorithm. Simulation analysis is done for the symbol error rate, energy efficiency, and secrecy capacity. Machine learning genetic algorithm is also used for the optimization of system parameters.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «HYBRID-NOMA FOR WIRELESS COMMUNICATION SYSTEM»

Научная статья УДК 504.054

DOI:10.31854/1813-324X-2023-9-3-104-111

Сс<

Hybrid-NOMA for Wireless Communication System

Rabia Khan, rabi.khanl4@gmail.com

National Research Tomsk Polytechnic University, Tomsk, 634050, Russian Federation

Abstract: The demand for spectral efficiency, security, energy efficiency, power efficiency, high data rate, and throughput increases with the advancement of wireless communication systems. Power domain non-orthogonal multiple access (NOMA) is one the famous algorithms to achieve the essential requirement of a wireless communication setup. This paper proposes a novel algorithm called hybrid NOMA (H-NOMA). The hybrid NOMA can improve power efficiency (PE), spectral efficiency (SE), symbol error rate (SER), and sum secrecy. It is based on Hybrid Constellation Shaping to support a wireless communication system. Security is another primary concern for all communication systems; the proposed H-NOMA also provides better secrecy capacity as compared to NOMA. This paper contains the basic structure of the proposed algorithm. Simulation analysis is done for the symbol error rate, energy efficiency, and secrecy capacity. Machine learning genetic algorithm is also used for the optimization of system parameters.

Keywords: dynamic power, genetic algorithm, hybrid constellation shaping, machine learning, NOMA, wireless communication

For citation: Khan R. Hybrid-NOMA for Wireless Communication System. Proc. of Telecommun. Univ. 2023;9(3): 104-111. (in Russ.) DOI:10.31854/1813-324X-2023-9-3-104-111

Hybrid-NOMA для беспроводной системы связи

Хан Рабиа, rabi.khanl4@gmail.com

Национальный исследовательский Томский политехнический университет, Томск, 634050, Российская Федерация

Аннотация: С развитием систем беспроводной связи возрастает потребность в спектральной эффективности, безопасности, энергоэффективности, высокой скорости передачи данных и пропускной способности. Неортогональный множественный доступ в домене мощности (NOMA) - один из известных алгоритмов для выполнения основного требования к настройке беспроводной связи. В этой статье предлагается новый алгоритм, называемый гибридным NOMA (H-NOMA). H-NOMA может улучшить энергоэффективность, спектральную эффективность, коэффициент ошибок по символам и секретность суммы. Он основан на Hybrid Constellation Shaping для поддержки системы беспроводной связи. Безопасность - еще одна первостепенная задача для всех систем связи; предлагаемый H-NOMA также обеспечивает лучшую секретность по сравнению с NOMA. Эта статья содержит базовую структуру предлагаемого алгоритма. Анализ моделирования выполняется для коэффициента ошибочных символов, энергоэффективности и секретности. Генетический алгоритм машинного обучения также используется для оптимизации параметров системы.

Ключевые слова: динамическая мощность, генетический алгоритм, формирование гибридного созвездия, машинное обучение, NOMA, беспроводная связь.

Ссылка для цитирования: Хан Р. Hybrid-NOMA для беспроводной системы связи // Труды учебных заведений связи. 2023. Т. 9. № 3. С. 104-111. DOI:10.31854/1813-324X-2023-9-3-104-m

© Хан Р., 2023

104

tuzs.sut.ru

1. LITERATURE REVIEW

The demand for modern wireless technology is leading the world towards a better but more complex wireless communication system. The gigantic, anticipated data transformation necessitates better Energy Efficiency (EE), reliability, massive connectivity, and low latency. Non-Orthogonal Multiple Access (NOMA) is one of the algorithms that offers the use of the same frequency band for the transmission of multiple signals. Several research analysis show that the NOMA outperform OFDMA [1]. In NOMA, the source broadcasts each signal after Superposition Coding (SC) to the respective consumers [2]. Each consumer receives superposed signals, which contain the signal of all users. Users that are closer to the source receive high power signals from all other users and the signal strength decreases for the distant users accordingly. For N consumers, each consumer (Un-nth consumer) performs Successive Interference Cancellation (SIC) for users with gn < g to decode its own signal. However, distant users receive very low power signals of near consumers, consequently they consider near users' signals as interference.

The M-NOMA [3], target to reduce the SIC complexity of the system with the offer of minimal interference with the help of created orthogonality/slicing during the modulation process rather than spectrum. Generally, slicing prevents interference between far and near consumers. Therefore, the consumers closer to the message source receive message signals without interference with distant users' signal. Hence, they need to apply SIC only to subtract message signals of near users for gn > g. Therefore, near and distant users need to perform SIC only within the same cluster of near or far users. Comparatively, the near consumers in M-NOMA perform N/2 times less SIC than NOMA but far users perform same number of SICs.

For the secrecy of NOMA, several authors are focused on providing secure regions to the legitimate users for healthier security. In [4], authors suggested to provide protected zones around the legitimate users or establish a prohibiting region for eavesdropper/s. In [5], a perfect cooperative scheme is presented that is contingent on the number of relays and their distances from the BS and eavesdroppers.

There are several other modulation-based techniques which are used to improve the overall performance of a system. Recently, the more focused and targeted techniques involve constellation shaping like Probabilistic Constellation Shaping (PCS), Geometric Constellation Shaping (GCS) and Hybrid Constellation Shaping (HCS) [6]. Constellation shaping was introduced to approach the Shannon capacity and better power efficiency. GCS contains equiprobable constellation points with non-uniform distribution is Euclidean space. On the other hand, PCS is more attractive due to closer approach towards Shannon capacity [7]. HCS improves the Spectral Efficiency by rearranging the con-

stellation points to a non-equidistant and non-uniform arrangement [8]. In a HCS method, the total amount of energy of each constellation point remains same, just like the conventional M-QAM. However, the total constellation point energy varies in probabilistic and geometric shaping.

Machine Learning (ML) techniques have been explored for several OMA algorithms in different scenarios including smart cities. Several ML algorithms have been introduced in a couple of year as Anderson-Darling test provided a ML based blind detection of modulation order opportunity in NOMA interference signals. Several future research works are open for ML-NOMA [9].

Genetic Algorithm (GA) is based on the principles of natural assortment and genetics. The complications with irregular variables, assorted continuous discrete variables and non-convex spaces involve optimization for the method design [10]. The GA is a suitable optimization ML process for an unconstrained optimization. It practices survival-of-the-fittest principle of nature to maximize the fitness function of the existing problem. MLGA is used in the few research articles of wireless communication systems. MLGA has been use for increasing the speed of the process of selection parameters [11], the optimization the BER in wavelength division multiplexing for four wave-mixing phenomena [12] and the optimization of major parameters in Vivaldi Antenna or Ultra-Wideband Communication [13]. MLGA is also useful to optimize parameters like data rate and energy efficiency [14].

The high energy consumption, limitation of power, SE, and band-width limitation, offers a great challenge for the implementation of an efficient wireless communication system. The requirements are the motivation towards proposing a novel Hybrid constellation-shaped NOMA (H-NOMA). The focus is to provide suitable way to efficiently use the available resources with maximum required output.

In this paper, the target is to use the required modulation constellation in a better way, by using the high energy level constellation point to modulate the high demand or far users and low energy levels to modulate the low demand or near users. As the users are modulated on one or more constellations, follows the same time and frequency, therefore, a name of H-NOMA is given.

H-NOMA can be used in several ways to avail yourself of the existing resources and algorithms. Depending on the distance of users from the source. If the distance is comparatively closer, there is no need to add additional power and only constellation point energies can be used. In the case of extremely far users, it can also be combined with NOMA, where far users are modulated on the high energy constellation point and allocated power to achieve the required Quality of Service. In the proposed H-NOMA, HCS is used to differentiate near and far users. The high energy constellation points

of a 16-QAM are used to modulate a distant user and the near user is modulated on comparatively low energy level constellation point. Therefore, it leads to a power efficient system with low symbol error rate (SER) and high Achievable Data Rate (ADR).

2. SYSTEM MODEL

2.1. System Description

Figure 1 shows the considered downlink H-NOMA scenario, where each user is mapped on the respective energy level of the 16-QAM constellation; Ui is mapped on the minimal and U4 is mapped on the highest energy level. The system contains total four users Ui < U2 < U3 < U4, Rayleigh flat fading channel, distance di < di < d3 < d4 and 16-QAM constellation modulation. Four legitimate users and an Eavesdropper (Eve) with channel g4 & g3 ~ gEve < g1 < g2 is considered in the system as shown in the Figure 1Fig. . The channel condition of the Eve is worse than near users U1 & U2 and approximately same as far users: < U3 < U4. Therefore, Eve cannot eavesdrop on the message sent to near users with better channel conditions. There are two types of eavesdroppers: internal and external. In the considered scenario, there is only one external passive Eve. Since the Eve is external, therefore, it does not have the Channel State Information (CSI) information of any of any user to perform SIC.

2.2. Power Allocation

In the proposed scenario, the power of each source of the system is given as the set: Ps = {Psi,Ps2, ...,PsW}. The sum of all power allocation coefficients, from each

source to each user, A = (a^i,..., aVn,..., aVN/2,..., is given as:

a = Z Œvm = 1

m=1

where a is the sum of coefficients of each user aVm involved in the transmission.

2.3. Sum Secrecy Capacity of the System

The data rate of Eve with NOMA is denoted as Re and H-NOMA

as R^e- As per the considerations, the Eve's channel condition is worse than near users i. e., ge < gN/2; therefore, it cannot decode the near users' signals. For NOMA, the secrecy capacity for nth user and the sum secrecy capacity can be written as:

$Mn = RMn RMe

and

1\

= I

MT = / °Mn.

N

n=-

(2)

(3)

For H-NOMA, the secrecy capacity for nth user and the sum secrecy capacity can be written as:

$мп = Rмп RMe

and

-I

MT = 1 $Mn.

N

n=-

(4)

(5)

It must be noted that the above equations are changed for the simulation results of section V.

N

Fig. 1. Graphical Representation of H-NOMA with Four Users

3. THE NEW POWER EFFICIENT HYBRID CONSTELLATION SHAPING BASED NOMA (HCS-NOMA) WITH M-QAM SHAPING

There are three types of Constellation Shaping techniques, for making the data rate or capacity of a system close to the ideal Shannon capacity. In this paper, HCS is used to design a novel NOMA technique called H-NOMA. In HCS, the Constellation Points (CPs) are shaped according to their amplitude and symbol occurrences which changes the ratio of amplitude and symbol in each CP. In HCS, the total energy in each CP is constant irrespective of the degree of shaping.

The CPs can be represented in its complex form as given below:

= + —a ± .. „ ja,

P

P(Ja)

(6)

E

^ , P^OO.

± — a± ]a P P(Ja)

(7)

= E[±p^(a)ja ± p^(ja)ja\.

For the above condition the expected value is the same of HCS and uniform symbol distribution.

3.1. Channel Description

For the H-NOMA, four users are modulated on a 16-QAM constellation for the transmission of the signal. It is helpful for developing a PE system. In H-NOMA, there is no need to allocate high power to the far user with weak channel condition gn < gn-1. Rather for fulfilling the quality of service requirement, the distant user of worst channel condition is modulated on the constellation point with better energy level and the near user of better channel condition is modulated on the low energy level constellation point.

For a conventional power domain NOMA, power is allocated to each user with respect to its distance and channel condition. A superposed NOMA signal for four user can be written as: x = Y,n=1^anPTxn, where a is the power coefficient and it is given as; a = o^ + a2 + + a3 + a4 = 1.

The superposed signal of four users for H-NOMA with 16-QAM can be written as:

^ = jptxhu (xl, X2,X3,X4),

(8)

where in the equation, PT represents the total transmission power of the constellation's signal; , , x3, are the symbols of four different users, modulated in one 16-QAM constellation Xun. 16-QAM has four energy levels, therefore, four users are modulated on each constellation,

as each user needs to have a unique energy/power level with respect to its distance. For more traffic, higher modulations with more energy levels like 64-QAM and 256-QAM can be used. The modulation higher than 16-QAM is not the scope of this paper. However, it will be explored in future research. In H-NOMA, N constellations can be superposed together with SC before broadcasting. It is possible to modulate more than four users in a single transmission, with each constellation Xun carrying four users' symbols. Hence, for N consumers, (8) can be written as

^ = ^Pr^Hn(x1,X2,X3,X4) + ~JPrXHn(x5,X6,X7,X8).

Yn = Jg^ + W(t).

(9)

where in the equation, p(a), p^(a), p(/a) and p^(/a) show the non-uniform and uniform probability of occurrences of a and ja.

To satisfy the HCS of QAM, the signal stream xW of each must satisfy the following condition:

Each user will receive the same signal with different power dissipation. Each receiver is considered to know the level of energy at which its signal is modulated. Knowing the energy level, each user will simply decode its signal. For n users, if transmitter transmitted n symbols and four users are modulated on each constellation, then transmitter needs to distinguish the signal by encapsulating code of different users on the transmitted signal. Addition of code is out of scope of this paper and will be addressed in the extended version.

3.2. Symbol Error Rate

This section explores the discussion of the symbol error rate of the constellation shaping of M-QAM. In a general M-QAM scheme, there are three CPs regions for symbols. The distribution of the symbols' location contains four symbols in the corner, (^M — 2) symbols inside and m — 2 symbols are on the edges of CPs. Hence, the SER distribution is also affected by the corner, inside and edge location of respective CPs symbols, 2kc, 4kj and 3ke.

The SER Kxi for each CPs' symbol, with respect to the respective position of the constellation map, Kxi □ 2kc, 4kj and 3keis given as:

Kxi = j Q (2dx[k]]) 2Lexp — (L2)dL =

\

¿mi

(10)

i + dm<; '

where in the above equation, L - the amplitude of the channel.

The average SER of modulated shaping is derived on the bases of the conventional uniform shaping SER. However, the SER of non-uniformly shaped constellation with d tki,x\k1 and differs from the conven-

Xi 1 1

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

tional one. The probability of error decreases with the

distance d m,. Hence, when the symbol x moves away

Xi

from its neighbouring CPs and towards the distant CPs then the chance of error decreases.

0

The SER for individual symbol for x]^ with non-uni-

For Modulation Shaping (MS), the average SER of the form HCS of M-QAM is given as in (11), where for 16- symbols of xt is ÇM & i'Ek^ km[x],c]] where k is the QAM, mj = 1, for M > 16, mj = {l,... - l} and the number of symbols in the constellation. corner CPs have not been considered.

km\x\ ]]

3ke,

3кE,

4 Kj,

= ! I P^ q I P'

- p(a) a - p(Ja) 1

,,Рц(а) ,P^Qa). = {-——-a -—T—rja

P( a) P( a)

(11)

- ^T" (2mi P( a)

1} + Pv(a) ,

P( a)

ja(2mi - 1)

3.3. Achievable Data Rate

In this paper, the achievable data rate is optimized by HCS. The symbol energy Es is supposed to be constant for the whole constellation, that the total energy of the constellation is always constant.

The ADR for the probabilistic and geometric shaping can be defined according to [15] as:

Rcs (SNR,X) = max Icsp(SNR,X,ps)

Ps--Es=1

and

RCSg(SNR,ps) ± ma^iIcs3(SNR,X,ps).

(12)

(13)

It can be seen from the above equations that in the PCS, the probabilities of the constellation symbols are being optimized and, in the GCS, constellation symbols are being optimized.

As the HCS involves the optimization of probabilities of constellation symbols and the symbols, therefore, the ADR of the HCS can be written as:

R

cSh (SNR, ps, X) =xmaxi ICSh (SNR, X,ps).

(14)

In this paper, Rayleigh fading channel is considered for the transmission of signal. Therefore, according to the fading application of Shannon capacity, the ADR can be written as:

RcSh (SNR, ps,X) = log2 (1 + <;Vmt) (15)

4. IMPLEMENTATION OF GENETIC ALGORITHM WITH MACHINE LEARNING

There are several methods for the optimization of physical parameters. In this paper, MLGA is being used for the optimization of multi-source system with respect to EE and the secrecy.

4.1. Energy Efficiency Optimization Problems

The use of power is a focus of attention for the integration of modern technology and therefore is highly subjected to energy limitations. For the proposed Intelligent Transportation System H-NOMA system, the EE is optimized for better system capability.

The EE of the system is given as:

R

Пее =

YNN=i\og2(l + (Vmt)

2P

2P

(16)

It is clear from (16), that the EE is directly related to the sum data rate of the system and inversely proportional to twice the total power of each transmitter since each user receives the same signal with two transmitters. The optimized sum data rate consequently optimizes the system's EE.

For the problem formulation, eight users are suppose-ed according to the system model of Figure 1. The sum data rate maximization problem can be formulated as:

P1: max: R.

2 N

= lRVn+l

RV Î.

Vn

(17)

For the optimization of data rate, the sum data rate is set as the fitness function in the genetic algorithm. The data rate is subjected to the respective NOMA power coefficients and the received SINR. The constraints are the power coefficients. According to NOMA, the offered constraints are:

N

C1

:А(аъ = ^ ап = 1,

п=1

C2: ап > 0,n = {1, ...,N}.

4.2. Sum Secrecy Capacity Optimization Problems

Alongside EE and demands the system, the security of the system is being focused to meet the security demand of the modern Intelligent Transportation System. Security is the basic requirement of any modern system of IoT due to the connection of plenty of objects and systems together.

In this section, the proposed system's sum secrecy capacity of the system is optimized as shown below:

and

S = R - R

SMT = Tl'N=NSMn ■

(18) (19)

V

sum

N

sum

п=1

п=1

2

It can be seen from (19) that the sum secrecy capacity depends on the capacity or data rate of each individual user of the system and the Eve. Hence, it is highly subjected to the individual's characteristics. It includes the channel, power, power coefficient, SINR and the interference. For the MLGA optimization, only system power, data rate and power coefficients of the system have been targeted.

For the formulation of problem, eight users are considered as given is the system model of Fig. , however due to worst channel condition of Eve as compared to near users, it cannot decode their signals. The sum data rate maximization problem for affected four far users can be formulated as:

performs approximately the same or better in some of the users' cases.

P2: max: S,

'Mf

(20)

10-1

10-2

For the optimization of sum secrecy capacity of the affected users, the sum secrecy capacity is used as the fitness function. The constraints for this case are again the NOMA power coefficients and the data rate. The reason for choosing the secrecy capacity as fitness function is to keep the difference of data rate optimized. Since the optimization of the power coefficients also optimizes the interference of both Eve and the affected users.

C3: A{a^..., aN) = Y,n=i an = 1, C4:an,n = {1,...,N} C5: RMn > RT Threshold, n = {1.....N}

5. PERFORMANCE EVALUATION

This section presents the simulation results of the proposed H-NOMA comparison with the base line conventional power domain NOMA. The first simulation result shows the basic comparison, the other two show the comparison with MLGA. For simulating the comparative results, 16-QAM, Rayleigh flat fading channel is used with four users. For more than four users, higher modulation techniques are required, which is not the scope of this paper.

Two different fitness functions are used including EE and sum secrecy capacity. MLGA works on the optimization of the fitness functions with respect to constraints. By checking all the combined possibilities, it provides the maximum possible output. Each simulation result in this section is the output of the similar MLGA procedure.

Figure 2 shows the simulated result of SER, for the comparison of NOMA with H-NOMA for four users. The comparison results show that H-NOMA transmission overall outperforms NOMA. In Figure 2, n = {1,2,3 and 4} is used to differentiate between each user. Where n = 1 is the nearest user with better channel condition and n = 4 is the furthest with the worst channel condition. It can be noticed that even when no extra power is used for the H-NOMA transmission, it

ja

(O

cr b

ô 10-3

10-4

10-5

NOMA-3

H-NOMA-3

NOMA-4

H-NOMA-1

NOMA-1

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

H-NOMA-4

NOMA-2

H-NOMA-2

10

15

SNR (dB)

20

25

30

Fig. 2. Comparison for NOMA, HCS-NOMA and HCS-MSNOMA with and without HCS

Figure 3 shows the simulated comparison for the EE of H-NOMA and NOMA. The simulation is done with four users' sum data rate and their EE. ADR and EE are directly related to power, and power coefficients are possible constraints in power domain NOMA. Therefore, for a fair comparison, the same power coefficient is used for H-NOMA as well.

If constellation energy levels will be used for ML iteration, then the number of possible iterations will remain 4 (total no. of energy levels in a 16-QAM constellation), which will affect comparison fairness. Result shows the better EE for H-NOMA than NOMA. It is interesting to notice that H-NOMA outperforms ML-HNOMA, this is since H-NOMA itself is an optimization technique. Therefore, in this case of EE, HCS-NOMA outperforms due to its optimized nature.

35

30-

ÈT25-

C

(D

O

20-

ÈS

£ 15-

LLI

10

H-NOMA ML-HNOMA ML-NOMA NOMA

8 10 SNR (dB)

12

14

Fig. 3. Comparison Results for the Effect of MLGA on HCS-NOMA and NOMA for EE

0

5

5

0

2

4

6

Figure 4 shows the simulated comparison of H-NOMA and NOMA for the sum secrecy capacity. It is considered that the near users 1 and 2 are not affected by the eavesdropper, therefore, Eve can overhear only user 3 and 4.

Fig. 4. Comparison Results for the Effect of MLGA on HCS-NOMA andNOMA

The Eve does not have the information about hybrid shaping and CSI. Eve cannot differentiate between the signals; therefore, it always receives the signal with high interference and cannot decode the exact signal. The high interference at the Eve's node results in the

better sum secrecy capacity of the H-NOMA system. The sum secrecy capacity increases with SNR. However, only a slight difference is observed with the use of MLGA for H-NOMA, due to ideal interference amongst each symbol. HCS-NOMA accomplishes better secrecy capacity, even without MLGA. For the positive secrecy capacity of NOMA, SIC is performed at the receiver of the intended user and no SIC at Eve.

6. CONCLUSION

In this paper, a novel H-NOMA is proposed to support PE, SER, and security. The proposed algorithm is a new type of NOMA with HCS called H-NOMA. In H-NOMA, an approach is made to save the power for distant users by utilizing the higher power of the constellation point, to modulate the signal of distant users. It supports the transmission of multiple signals for all users. The simulation results also show the better SER, ADR, Sum Secrecy Capacity, and EE performance as compared to the traditional scheme with and without MLGA.

The main motivation of this paper was towards the efficient usage of the power levels of the modulation constellation and save enough additional power added for distant users in NOMA. Alongside power, it also provides better utilization of Band Width. Not only due to same channel usage but also by sending multiple users' signals on the same constellation.

SNR (dB)

References

1. Khan R., Asif R. Reflective In-Band Full Duplex NOMA Communications for Secure 5G Networks. Proceedings of the International Conference on Smart Applications, Communications and Networking, SmartNets, 22-24 September2021, Glasgow, United Kingdom. IEEE; 2021. DOI:10.1109/SmartNets50376.2021.9555418

2. Khan R., Jayakody Nalin D.N.K. An ultra-reliable and low latency communications assisted modulation based non-orthogonal multiple access scheme. Physical Communication. 2020;43:101035. D0I:10.1016/j.phycom.2020.101035

3. Khan R., Jayakody D.N.K., Parvaiz H., Tafazolli R. Modulation Based Non-Orthogonal Multiple Access for 5G Resilient Networks. IEEE Globecom Workshops, GC Wkshps, 09-13 December 2018, Abu Dhabi, United Arab Emirates. IEEE; 2018. D0I:10.1109/GL0C0MW.2018.8644085

4. Gomez G., Martin-Vega F.J., Lopez-Martinez F.J., Liu Y., Elkashlan M. Uplink NOMA in Large-Scale Systems: Coverage and Physical Layer Security. arXiv. 2017. DOI:10.48550/arXiv.1709.04693

5. Arafa A, Shin W., Vaezi M, Poor H.V. Securing Downlink Non-Orthogonal Multiple Access Systems by Trusted Relays. Proceedings of the Global Communications Conference, GLOBECOM, 09-13 December 2018, Abu Dhabi, United Arab Emirates. IEEE; 2018. DOI:10.1109/GLOCOMW.2018.8648037

6. Szczecinski L., Alvarado A. Bit-Interleaved Coded Modulation: Fundamentals, Analysis and Design. John Wiley and Sons, 2015. 320 p.

7. Batshon H.G., Mazurczyk M.V., Cai J-X., Sinkin O.V., Paskov M., Davidson C.R., et el. Coded Modulation based on 56APSK with Hybrid Shaping for High Spectral Efficiency Transmission. Proceedings of the European Conference on Optical Communication, ECOC, 17-21 September 2017, Gothenburg, Sweden. IEEE; 2017. DOI:10.1109/ECOC.2017.8346117

8. Rajaram A., Jayakody D.N.K., Chen B., Dinis R., Affes S. Modulation-Based Simultaneous Wireless Information and Power Transfer. IEEE Communications Letters. 2020;24:136-140. DOI:10.1109/LCOMM.2019.2946236

9. Khan R., Kumar P., Jayakody D.N.K., Liyanage M. A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions. IEEE Communications Surveys & Tutorials. 2020;22(1):196-248. DOI:10.1109/ COMST.2019.2933899

10. Rao S.S. Engineering Optimization: Theory and Practice. John Wiley and Sons; 2019. 832 p.

11. Yakzan A., Green R., Hines E. A Neuro-Genetic Hybrid Algorithm Utilizing Outdoors LOS Optical Wireless Channels. Proceedings of the Fourth International Conference on Computational Intelligence, Communication Systems and Networks, 24-26July 2012, Phuket, Thailand. DOI:10.1109/CICSyN.2012.18

12. Singh K., Bhattacharjee R. Bit error rate performance of genetic algorithm optimized WDM systems. Proceedings of the IFIP International Conference on Wireless and Optical Communications Networks, 11-13 April 2006, Bangalore, India. IEEE; 2006. DOI:10.1109/WOCN.2006.1666661

13. Behera B.R. Vivaldi antenna for UWB communications: Design modelling and analysis of Vivaldi Antenna with genetic algorithm. Proceedings of the International Conference on Control, Computing, Communication and Materials, 1CCCCM, 21-22 October 2016, Allahbad, India. IEEE; 2016. D01:10.1109/ICCCCM.2016.7918252

14. Khan R., Tsiga N., Asif R. Interference Management with Reflective In-Band Full Duplex NOMA for Secure 6G Wireless Communication System. Sensors. 2022;22(7):2508. D0I:10.3390/s22072508

Список источников

1. Khan R., Asif R. Reflective In-Band Full Duplex NOMA Communications for Secure 5G Networks // Proceedings of the International Conference on Smart Applications, Communications and Networking (SmartNets, Glasgow, United Kingdom, 22-24 September 2021). IEEE, 2021. D0I:10.1109/SmartNets50376.2021.9555418

2. Khan R., Jayakody D.N.K. An ultra-reliable and low latency communications assisted modulation based non-orthogonal multiple access scheme // Physical Communication. 2020. Vol. 43. P. 101035. D0I:10.1016/j.phycom.2020.101035

3. Khan R., Jayakody D.N.K., Parvaiz H., Tafazolli R. Modulation Based Non-Orthogonal Multiple Access for 5G Resilient Networks // IEEE Globecom Workshops (GC Wkshps, Abu Dhabi, United Arab Emirates, 09-13 December 2018). IEEE, 2018. D0I:10.1109/GL0C0MW.2018.8644085

4. Gomez G., Martin-Vega F.J., Lopez-Martinez F.J., Liu Y., Elkashlan M. Uplink N0MA in Large-Scale Systems: Coverage and Physical Layer Security // arXiv. 2017. D0I:10.48550/arXiv.1709.04693

5. Arafa A, Shin W., Vaezi M, Poor H.V. Securing Downlink Non-0rthogonal Multiple Access Systems by Trusted Relays // Proceedings of the Global Communications Conference (GLOBECOM, Abu Dhabi, United Arab Emirates, 09-13 December 2018). IEEE, 2018. D0I:10.1109/GL0C0MW.2018.8648037

6. Szczecinski L., Alvarado A. Bit-Interleaved Coded Modulation: Fundamentals, Analysis and Design. John Wiley and Sons, 2015. 320 p.

7. Batshon H.G., Mazurczyk M.V., Cai J-X., Sinkin 0.V., Paskov M., Davidson C.R., et el. Coded Modulation based on 56APSK with Hybrid Shaping for High Spectral Efficiency Transmission // Proceedings of the European Conference on 0ptical Communication (ECOC, Gothenburg, Sweden, 17-21 September 2017). IEEE, 2017. D0I:10.1109/EC0C.2017.8346117

8. Rajaram A., Jayakody D.N.K., Chen B., Dinis R., Affes S. Modulation-Based Simultaneous Wireless Information and Power Transfer // IEEE Communications Letters. 2020. Vol. 24. PP. 136-140. D0I:10.1109/LC0MM.2019.2946236

9. Khan R., Kumar P., Jayakody D.N.K., Liyanage M. A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions // IEEE Communications Surveys & Tutorials. 2020. Vol. 22. Iss. 1. PP. 196-248. D0I:10.1109/C0MST.2019.2933899

10. Rao S.S. Engineering 0ptimization: Theory and Practice. John Wiley and Sons, 2019. 832 p.

11. Yakzan A., Green R., Hines E. A Neuro-Genetic Hybrid Algorithm Utilizing 0utdoors L0S 0ptical Wireless Channels // Proceedings of the Fourth International Conference on Computational Intelligence, Communication Systems and Networks (Phuket, Thailand, 24-26 July 2012). D0I:10.1109/CICSyN.2012.18

12. Singh K., Bhattacharjee R. Bit error rate performance of genetic algorithm optimized WDM systems // Proceedings of the IFIP International Conference on Wireless and Optical Communications Networks (Bangalore, India, 11-13 April 2006). IEEE, 2006. D0I:10.1109/W0CN.2006.1666661

13. Behera B.R. Vivaldi antenna for UWB communications: Design modelling and analysis of Vivaldi Antenna with genetic algorithm // Proceedings of the International Conference on Control, Computing, Communication and Materials (ICCCCM, allahbad, India, 21-22 October 2016). IEEE, 2016. D0I:10.1109/ICCCCM.2016.7918252

14. Khan R., Tsiga N., Asif R. Interference Management with Reflective In-Band Full Duplex N0MA for Secure 6G Wireless Communication System // Sensors. 2022. Vol. 22. Iss. 7. P. 2508. D0I:10.3390/s22072508

Статья поступила в редакцию 01.05.2023; одобрена после рецензирования 24.05.2023; принята к публикации 02.06.2023.

The article was submitted 01.05.2023; approved after reviewing 24.05.2023; accepted for publication 02.06.2023.

Хан Рабиа

Информация об авторе:

аспирант Инженерной школы информационных технологий и робототехники Национального исследовательского Томского политехнического университета https://orcid.org/0000-0001-8169-7177

i Надоели баннеры? Вы всегда можете отключить рекламу.