Next Article in Journal
CCFD: Efficient Credit Card Fraud Detection Using Meta-Heuristic Techniques and Machine Learning Algorithms
Previous Article in Journal
Optimal Investment Consumption Choices under Mispricing and Habit Formation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Comprehensive Analytical Framework under Practical Constraints for a Cooperative NOMA System Empowered by SWIPT IoT

by
Huu Q. Tran
1,*,
Samarendra Nath Sur
2 and
Byung Moo Lee
3,4,*
1
Faculty of Electronics Technology (FET), Industrial University of Ho Chi Minh City, Ho Chi Minh City 70000, Vietnam
2
Department of Electronics and Communication Engineering, Sikkim Manipal Institute of Technology, Sikkim Manipal University, Majitar, Rangpo 737136, Sikkim, India
3
Department of Artificial Intelligence and Robotics, Sejong University, Seoul 05006, Republic of Korea
4
Department of Convergence Engineering for Intelligent Drone, Sejong University, Seoul 05006, Republic of Korea
*
Authors to whom correspondence should be addressed.
Mathematics 2024, 12(14), 2249; https://doi.org/10.3390/math12142249
Submission received: 7 June 2024 / Revised: 17 July 2024 / Accepted: 17 July 2024 / Published: 19 July 2024
(This article belongs to the Section Engineering Mathematics)

Abstract

:
Over the past decade, there has been notable attention directed towards spectrum and energy efficiency in conjunction with simultaneous wireless information and power transfer (SWIPT), aimed at extending the operational lifespan of energy-constrained wireless devices within cooperative non-orthogonal multiple access (C-NOMA) systems. This article delves into a system model comprising a transmitter, a relay, and two users, where the time-switching receiver (TSR) protocol is employed for energy harvesting at the relay. The objective of this study is to evaluate the performance of the system in terms of outage probability (OP), and system throughput (ST), and to determine the optimal time-switching (TS) factor. Our analysis encompasses the evaluation of OP, ST, and the determination of the optimal TS factor. Numerical simulation results reveal that the Nakagami-m fading channel exhibits the lowest outage probability, and that system throughput escalates with the signal-to-noise ratio (SNR) augmentation. These findings underscore the potential of the Nakagami-m fading channel to enhance energy efficiency in C-NOMA systems and suggest promising directions for future research.

1. Introduction

1.1. Information Background

NOMA represents a multiple access technique that integrates multiplexing and multi-user detection methods, enabling multiple users to share a single channel efficiently. In contrast to Frequency Division Multiple Access (FDMA) and Orthogonal Frequency Division Multiple Access (OFDM), which fall under the category of Orthogonal Multiple Access (OMA) techniques, NOMA presents a more effective means of leveraging the radio spectrum, exemplified by Orthogonal Frequency Division Multiple Access (OFDMA). NOMA facilitates more efficient resource utilization by allocating distinct portions of resources such as frequency, power, or codes to individual users. Moreover, it enables the provision of asymmetric data rates and diverse Quality of Service (QoS) standards, thus enhancing flexibility in service offerings [1,2]. The Time-Splitting Relaying (TSR) protocol has demonstrated notable efficacy in enhancing the performance of NOMA-Simultaneous Wireless Information and Power Transfer (SWIPT) systems, evident in improvements in both energy efficiency and data rate. Consequently, TSR stands as a valuable asset for researchers and engineers engaged in the development of C-NOMA-SWIPT systems [3]. In NOMA systems, the Decode-and-Forward (DF) approach serves as a cooperative relaying mechanism for SWIPT. Within NOMA setups, multiple users share the same frequency band, receiving identical signals from a singular base station (B). In SWIPT configurations, user equipment derives power from received wireless signals. Employing multiple relay nodes in the cooperative relaying process enhances communication link reliability and coverage area. In DF relaying, the relay node decodes the received signal, re-encodes it, and subsequently transmits it to the destination node. This method presents significant advantages in energy efficiency and communication performance over conventional single-hop communication systems. The fundamentals of DF relaying for SWIPT in NOMA systems and its advantages over other relaying strategies will be covered in this section [4,5,6]. NOMA has recently emerged as a promising candidate for future wireless networks due to its capacity for significant improvements in spectral and energy efficiency, as well as fairness [7,8]. Power domain NOMA employs techniques such as superimposed coding (SC) [9] and successive interference cancellation (SIC) [10,11] to combine transmission signals at the transmitter and decode reception signals at the receivers [12]. Consequently, it enables the source to serve multiple users using the same frequency/time resources [5]. Furthermore, in NOMA network systems, users are allocated different power levels to ensure fairness. This approach implies that users closer to the source receive less power compared to those farther away [13]. In C-NOMA scenarios [14], a user located at a distance with weaker channel conditions may require assistance from another user to relay the signal from the source to itself. This signal-forwarding process can occur in systems with or without obstacles. The inclusion of a relay user in C-NOMA facilitates the uninterrupted propagation of information to the intended destination. However, in obstacle-free systems, referred to as C-NOMA with direct link [15,16,17], the involvement of a cooperative user ensures the integrity and reliability of the transmitted signal for the distant user, even though the signal from the source can reach this user directly. At user relay, amplify-and-decode (AF) [18], DF [19,20] schemes are utilized to harvest energy and forward information to the destination. As SWIPT [21] is exploited at the user relay in C-NOMA, it can combine with power-splitting relaying (PSR) and TSR [22] protocols for simultaneous EH and information decoding. The energy harvested at R is to maintain its lifetime due to battery limitations. In [23], a full-duplex (FD) cooperative NOMA model with one BS and two users was studied. Both direct link and no direct link between the BS and far user were considered. In [17], a C-NOMA with and without a direct link was investigated. The closed-form outage probability expression was derived for both no direct link and direct link. The OP for FD NOMA is better than that for half-duplex (HD) NOMA. Besides, throughput, ergodic rate and energy efficiency were evaluated for FD and HD NOMA.

1.2. Related Works and Motivation

C-NOMA can operate in both HD and FD modes [24,25]. Due to the simultaneous reception and transmission of signals in the same time slot and frequency band, FD mode can improve the spectral efficiency of the NOMA system by up to two times compared to HD mode [14,15,16]. Therefore, FD relay technology has been shown as a promising scheme for 5G-based wireless networks. In [25], an FD multi-antenna relay-assisted C-NOMA network was examined. The system comprised one BS, a cognitive near user, and a cognitive far user. An optimization problem regarding user rate was addressed, revealing that the impact of residual self-interference at the FD relay and inter-user interference in the near-user scenario could be significantly mitigated. Both analytical and simulation-based assessments were conducted to determine the outage performance in [23]. The study in [23] also demonstrated that FD NOMA exhibits a lower OP than HD NOMA in the low Signal-to-Noise Ratio (SNR) region. Additionally, the system throughput for Delay-Limited Transmission (DLT) mode in FD NOMA surpassed that of HD NOMA. Furthermore, in [15], the outage performance of the proposed FD C-NOMA scheme, specifically an FD device-to-device (D2D) aided C-NOMA scheme, outperformed that of conventional NOMA and OMA. The expressions for outage probability were also derived in the same work. In [26], the authors investigated the confidentiality performance of cooperative NOMA systems integrating EH and FD relaying employing power splitting protocol over experience-independent, non-selective block Rayleigh fading. Their emphasis was on deriving closed-form expressions for EH-FD-NOMA, encompassing the lower bound on ergodic secrecy rates and the approximated secrecy OPs for the two users. In [27], the authors investigated a cooperative communication scheme that combines C-NOMA, FD relaying, and EH techniques through the utilization of a TS protocol over independent Rayleigh fading channels. They derived closed-form expressions to evaluate the performance of the proposed EH-FD-NOMA system, including OPs and ergodic rates. In [28], the authors introduced a Cooperative Spectrum-Sharing Transmission (CSST) scheme employing the DF relaying strategy. Their study incorporated realistic considerations such as FD-based loop self-interference, NOMA-based imperfect successive interference cancellation, and transceiver hardware impairments in Internet of Things (IoT) devices. Utilizing Nakagami-m fading environments, a comprehensive performance analysis was conducted by deriving expressions for the OP for both primary and secondary networks within the FD-based CSST scheme under both TS and PS protocols. NOMA-SWIPT takes center stage as an indispensable requisite in the landscape of IoT networks. In a time marked by the explosive proliferation of IoT devices, where the optimization of both energy and spectral efficiency reigns supreme, NOMA-SWIPT emerges as a revolutionary remedy. By facilitating the concurrent sharing of scarce spectrum resources among multiple IoT devices, NOMA not only fine-tunes spectral utilization but also furnishes the critical capability of wireless power transfer. This dual-faceted functionality transcends mere convenience; it becomes imperative, particularly in scenarios where IoT devices are deployed in remote or inaccessible locales, challenging the provision of continuous power supply. Consequently, NOMA-SWIPT assumes the pivotal role of empowering IoT networks to unlock their full potential, cultivating sustainable, ever-connected ecosystems that catalyze innovation and drive efficiency across a spectrum of industries [29,30,31,32]. In addition, Table 1 summarizes the related works.

1.3. Contributions

Within the domain of SWIPT IoT systems employing C-NOMA techniques, this paper presents a series of substantial contributions:
  • An innovative C-NOMA scheme custom-tailored for SWIPT-enabled IoT systems takes center stage. This scheme orchestrates power allocation for two users through a pivotal relay node (R) in the DF of signals from the B. It is essential to emphasize that R also performs the critical task of EH from the power beacon (PB). This holistic integration of power management, signal manipulation, and EH within a unified relay node represents a groundbreaking strategy, aimed at optimizing overall system efficiency. The scheme utilizes a TS receiver architecture, enabling R to simultaneously perform both EH and Information Processing (IP) tasks.
  • EH Protocol Advancement: The paper introduces an advanced EH protocol with an HD-based TSR mechanism meticulously designed for SWIPT-based C-NOMA systems. This EH protocol assumes a pivotal role in the harnessing of energy from received signals, thereby bolstering the sustainability and autonomy of IoT devices interconnected within the network.
  • In an effort to provide a comprehensive understanding of system performance, the paper derives precise closed-form expressions for critical metrics, including but not limited to OP and System Throughput (ST). These analytical expressions serve as essential tools for rigorously evaluating the proposed C-NOMA and EH schemes. Researchers and practitioners can use these insights to make informed decisions and assess the effectiveness of these systems in practical IoT deployments.

1.4. Organization and Notations

Organization: The paper is organized as follows: Section 2 introduces the system model of the relay-assisted C-NOMA along with its assumptions. Section 3 outlines the energy harvesting process at the relay node based on time-switching relaying. Section 4 delves into the analysis of performance evaluation. Section 5 focuses on determining the optimal time-switching factor to minimize the outage probability of users. Section 6 elaborates on the simulation results. Finally, Section 7 offers conclusions and summarizes the key findings of this study. The abbreviations and acronyms are presented in Table 2.
Notations: The notation E . stands for the operation of calculating expectation. f X ( . ) and F X ( . ) denote the probability density function (PDF) and the cumulative distribution function (CDF) of a random variable X, respectively.

2. System Model

The system model under investigation is illustrated in Figure 1. In this system, the signal is transmitted from source B to two users, namely U 1 and U 2 , via relay node R. R operates as a DF relay to forward the information from B to U 1 and U 2 . The relays are power-limited devices and rely on the support of a PB. We denote the parameters of the system model as follows: c r represents the channel coefficients from the source PB to R, while c 0 , c 1 , and c 2 represent the channel coefficients from the source B to R and from R to U 1 and U 2 , respectively.
In this system model, we assume that there are no additional power sources embedded in the relay node to provide energy. Hence, in the initial phase, the relay node harvests energy from neighboring nodes, i.e., source B and the destinations U 1 and U 2 shown in the figure, to facilitate the forwarding of information. Specifically, this harvested energy can be stored in the batteries so that it can then be reused to forward the information from B to U 1 and U 2 . The channels have power gains c R 2 , c 0 2 , c 1 2 , c 2 2 . The power gains are distributed according to exponential RVs with Ω i , i 0 , 1 , 2 , respectively. It is assumed that all wireless links are non-selection blocks and independent Rayleigh fading and are impacted by AWGN with average power N 0 .

3. The TSR-Based Energy Harvesting of the Relay Node

3.1. The Energy Harvesting at the Relay Node

The EH scheme involving time and power is depicted in Figure 2. Within ϱ T , the B transfers energy to R via a single antenna with consistent sending power (referred to as the energy-transfer phase). In this context, T and ϱ 0 , 1 , signify the coherence time block and the TS ratio, respectively. During the period referred to as the data transmission phase, which lasts for 1 ϱ T , R transmits message information signals to two users in the second hop, while B simultaneously broadcasts the aggregated signals from the users to the R node in the first hop.

3.2. Phase: Energy Transfer

During this phase, the receiver uses its resources to collect radio frequency energy from the power beacon during a time slot labeled as ϱ T . Here, ϱ represents the time switching ratio, and T denotes the duration of the block time period. The energy harvested through this process can be precisely described as follows:
E r = η ϱ T P B c 0 2 .
In this case, η 0 , 1 indicates the energy conversion efficiency of the B, while P B stands for the transmit power of the B. Let us denote c 0 2 as the channel coefficient from B to R. Following the nonlinear energy-harvesting approach outlined in [38], the transmit power of R acquired over the duration of 1 ϱ T 1 ϱ T 2 2 can be expressed as:
P r = 2 E r 1 ϱ T = 2 η ϱ P B c 0 2 1 ϱ ,   ϱ P B c 0 2 ι 2 η ϱ ι 1 ϱ ,   ϱ P B c 0 2 > ι
where ι is the power saturation threshold.

3.3. Phase: Data Transmission

3.3.1. Stage. 1: Communication

During the initial time slot, B transmits the overlaid mixture, α 1 P B s 1 + α 2 P B s 2 , where s i and α i represent the signal and power allocation coefficient of user i, respectively. Notably, α 1 + α 2 = 1 , and it is assumed that α 1 < α 2 . The baseband received signal at R can thus be expressed as follows:
y r = c r x + n r = c r α 1 P B s 1 + α 2 P B s 2 + n r ,
where n r C N 0 , N 0 is the AWGN component at R. At first, R decodes the U 2 ’s message using SIC and based on the NOMA principle it decodes its own message. To decode the messages s 2 and s 1 at R, the corresponding SINR and SNR can be expressed as follows:
γ r s 2 = α 2 P B c r 2 α 1 P B c r 2 + N 0 = α 2 ρ B γ ¯ r α 1 ρ B γ ¯ r + 1 ,
and
γ r s 1 = α 1 ρ B γ ¯ r δ a 2 ρ B γ ¯ r + 1 ,
Here, γ ¯ r = Δ c r 2 , ρ B = P B N 0 depicts the SNR level at the transmitter side and the residual noise interference is represented by δ . In real-world scenarios of NOMA systems, achieving pSIC might not always be possible. Therefore, if δ = 0 , U 1 employs pSIC to decode the received signal. However, if δ ranges between 0 < δ 1 , U 1 resorts to ipSIC.

3.3.2. Stage. 2: Communication

During the second time slot, relays transmit this information to U 1 and U 2 . Thus, the received signal at U i , i 1 , 2 can be expressed as follows:
y U i = c i α 1 P r s 1 + α 2 P r s 2 + n U i ,
Here, c i represents the channel gain between the relay and U i , and n U i C N 0 , N 0 represents the AWGN noise at U i . Following the SIC principle, U 2 decodes symbol s 2 while treating s 1 as noise. Based on Equation (6), SINR at U 2 is given by:
γ U 2 s 2 = α 2 P r c 2 2 α 1 P r c 2 2 + N 0 .
Replace Equation (2) with Equation (7) we have:
γ U 2 s 2 = α 2 χ γ ¯ 0 , 2 α 1 χ γ ¯ 0 , 2 + 1 , ϱ ρ B c 0 2 ι α 2 χ ˜ h 2 2 α 1 χ ˜ c 2 2 + 1 , ϱ ρ B c 0 2 > ι
where γ ¯ 0 , 2 = Δ c 0 2 c 2 2 and χ = 2 η ϱ ρ B 1 ϱ . It is important to note that at U 1 , both s 1 and s 2 are present simultaneously. Consequently, using the SIC method, U 1 needs to decode s 1 . By considering the low-power signal s 1 as interference and utilizing SIC to eliminate it, U 1 can then extract the symbol s 1 by decoding the high-power symbol s 2 . Consequently, the received SINR for s 2 at U 1 can be formulated as follows:
γ U 1 s 2 = α 2 P r c 1 2 α 1 P r c 1 2 + N 0 = α 2 χ γ ¯ 0 , 1 α 1 χ γ ¯ 0 , 1 + 1 , ϱ ρ B c 0 2 ι α 2 χ ˜ c 1 2 α 1 χ ˜ c 1 2 + 1 , ϱ ρ B c 0 2 > ι
Here, γ ¯ 0 , 1 = Δ c 0 2 c 1 2 . Once canceled, the signal s 2 is only partially removed and transforms into interference. The SINRs of symbol s 1 at U 1 are given as follows:
γ U 1 s 1 = α 1 χ γ ¯ 0 , 1 δ α 2 χ γ ¯ 0 , 1 + 1 , ϱ ρ B c 0 2 ι α 1 χ ˜ c 1 2 δ α 2 χ ˜ c 1 2 + 1 , ϱ ρ B c 0 2 > ι
Similarly, at R, when δ = 0 and 0 < δ 1 , it corresponds to the cases of pSIC and ipSIC, respectively.

4. Performance Assessment

4.1. Channel Characteristics

Let us examine two distinct random variables following the κ μ distribution, each characterized by the PDF as shown in Equation (11).
f T e r = 2 μ e 1 + κ e μ e + 1 2 r μ e κ e μ e 1 2 e μ e κ e r ^ e μ e + 1 e μ e 1 + κ e r 2 r ^ e 2 I μ e 1 2 μ e κ e 1 + κ e r r ^ e ,
In the given context, where ‘e’ belongs to the set of real numbers, including 0, 1, and 2, κ e , which is greater than 0, represents the ratio between the combined power of the primary components and that of the scattered waves. μ e , also greater than 0, is influenced by the quantity of multipath clusters. The function I v ( s ) refers to the modified Bessel function of the first kind and order ‘v’, while r ^ e represents the root-mean-square (RMS) value of the received signal envelope, denoted as T e . As described in reference [23], we have:
r ^ e = E T e 2 = μ e 1 + κ e r ¯ e Γ μ e F 1 1 μ e + 0.5 ; μ e ; κ e μ e e κ e μ e Γ μ e + 0.5 ,
E T e l = F 1 1 μ e + 0.5 l ; μ e ; κ e μ e e κ e μ e r ^ e l Γ μ e + 0.5 l μ e 1 + κ e l 2 Γ μ e .
In this context, r ¯ e = E [ T i ] , where E [ s ] denotes the expectation operator, and r ¯ e = E [ T e l ] signifies the lth moment of T e . Additionally, F 1 1 ( s ; y ; z ) refers to the confluent hypergeometric function, and Γ ( . ) represents the Gamma function.
If we let γ ¯ e denote the instantaneous SNR of κ μ fading channel, we can derive the PDF of its instantaneous SNR γ ¯ e from the envelope PDF provided in Equation (11) by employing a variable transformation r = x r ^ e 2 Ω e , which converts γ ¯ e into a fading channel, as described in Equation (14).
f γ ¯ e s = μ e 1 + κ μ e + 1 2 s μ e 1 2 κ e μ e 1 2 e μ e κ e Ω e μ e + 1 2 e μ e 1 + κ e x Ω e I μ e 1 2 μ e κ e 1 + κ e Ω e s ,
where Ω e = E γ ¯ e . The modified Bessel function of the first kind from [39] (Eq. (9.6.16)), (14) is substituted as I v u = b = 0 1 1 b ! Γ b + v + 1 b ! Γ b + v + 1 u u 2 2 2 b + v and defining ψ e = μ e 1 + κ e μ e 1 + κ e Ω e Ω e , (14) can be re-written as follows:
f γ e s = 1 e μ e κ e b = 0 μ e κ e b ψ e b + μ e b ! Γ b + μ e x b + μ e 1 e ψ e s = 1 e μ e κ e b = 0 μ e κ e b ψ e b + μ e b ! Γ b + μ e Γ b + μ e , ψ e ,
where Γ Ξ e , Δ e refer to the PDF of the gamma distribution as in Equation (16)
f Z e z = Δ e Ξ e Γ Ξ e z Ξ e 1 e z Δ e ,
The form parameter is denoted by Ξ e , while the rate parameter, represented by Δ e , serves as an inverse scale parameter. Table 3 summarizes the notations employed in this document.
The CDF of γ ¯ e is given by:
F γ ¯ e s = 1 Q μ e 2 κ e μ e , 2 ψ e s , s > 0 ,
where Q c e , b = e 1 c b s c e s 2 + e 2 s 2 + e 2 2 2 I c 1 e s d s specifies the generalized Marcum Q-function for integer values of μ , and with the help of [25] (Eq. (4.63)) and [39] (Eq. (8.352.6)), F γ ¯ e s can be simplified as follows:
F γ ¯ e s = e κ e μ e ψ e s r = μ e ψ e s κ e μ e r r 2 2 I r 2 κ e μ e ψ e s .
Utilizing I r e s = n = 0 e s e s 2 2 2 n + r n ! Γ n + r + 1 , we have
F γ ¯ e s = e κ e μ e ψ e s r = μ e n = 0 κ e n μ e n ψ e n + r s n + r n ! Γ n + r + 1 .
In this section, following a methodology similar to that outlined in [40,41], we determine the product distribution of X 0 , l = γ ¯ 0 γ ¯ l , where l { 1 , 2 } , for the double κ μ fading channel. Given that the PDFs of γ ¯ 0 , γ ¯ 1 , and γ ¯ 2 are expressed as linear combinations of the gamma distribution, it becomes straightforward to compute the PDF of the product term X 0 , l = γ ¯ 0 γ ¯ l using [42] (Lemma 2), as depicted below:
f X 0 , l s = ψ 0 ψ l Φ 0 , l m = 0 n = 0 I 0 , l n , m G 0 , 2 2 , 0 s ψ 0 ψ l m + μ 0 1 n + μ l 1 ,
where I 0 , l n , m = μ 0 κ 0 m μ l κ l n n ! m ! Γ m + μ 0 Γ n + μ l , Φ 0 , l = e μ 0 κ 0 + μ l κ l and G p , q m , n . is the Meijer G-function.
After performing some mathematical manipulations on Equation (20), the PDF of the product distribution simplifies to Equation (21). Here, we set A 0 = 1 ψ 0 , A l = 1 ψ l , ζ 0 = s μ 0 κ 0 μ l κ l A 0 A l , ξ = j + μ 0 + μ l , F ˜ q p α 1 , α 2 , , e p ; b 1 , b 2 , , b q ; z represents the regularized Hypergeometric function [43], and K j . stands for the jth-order modified Bessel function of the second kind. Subsequently, f X 0 , l ( s ) is computed as:
f X 0 , l s = 2 s Φ 0 , l j = 1 s A 0 A l ξ 2 μ 0 κ 0 j K j + μ 0 μ l 2 s A 0 A l 0 F ˜ 3 ; 1 + j , j + μ 0 , μ l ; ζ 0 + j = 0 s A 0 A l ξ 2 μ l κ l j K j μ 0 + μ l 2 s A 0 A l 0 F ˜ 3 ; 1 + j , μ 0 , j + μ l ; ζ 0
The proof of (21) is shown in Appendix A.
Similar to this, according to [41] (Lemma 2), the CDF of the product of two κ μ Random Variables (RVs) can be calculated as shown in Equation (22).
F X 0 , l s = 1 Φ 0 , l m = 0 n = 0 I 0 , l n , m G 1 , 3 2 , 1 s ψ 0 ψ l 1 m + μ 0 , n + μ l , 0 ,
where Φ 0 , l and I 0 , l n , m were defined previously.

4.2. The OP

OP is a critical metric in NOMA systems, impacting user fairness, QoS, system capacity, and overall network performance. By conducting thorough analysis and optimization, NOMA systems can ensure reliable and efficient communication, supporting various applications and services in modern wireless networks.
We define R 1 and R 2 as the target data rates for s 1 and s 2 , respectively. We then introduce ε 1 and ε 2 as defined by ε 1 = 2 2 R 1 1 ϱ 1 and ε 2 = 2 2 R 2 1 ϱ 1 . Subsequently, we provide expressions for the output performance measures O U 1 o u t and O U 2 o u t .

4.2.1. The OP in the Scenario of LEH

OP of U 1 : The OP of U 1 encompasses two scenarios: firstly, U 1 fails to detect the signal s 1 at the receiving end R. Secondly, even if U 1 successfully detects s 1 , it still might not be able to correctly identify its own transmitted message s 1 . Considering these situations, the OP of U 1 is articulated as follows:
O U 1 L E H = 1 Pr γ r s 2 > ε 2 , γ r s 1 > ε 1 , γ U 1 s 2 > ε 2 , γ U 1 s 1 > ε 1 = 1 Pr γ ¯ r > Ξ max , γ ¯ 0 , 1 > Θ max = 1 F ¯ γ ¯ r Ξ max F ¯ γ ¯ 0 , 1 Θ max ,
where F ¯ γ ¯ r . = 1 F γ ¯ r . and F ¯ γ ¯ 0 , 1 . = 1 F γ ¯ 0 , 1 . are the complementary cumulative distribution function, Ξ 1 = ε 1 ρ B α 1 ε 1 δ α 2 , Ξ 2 = ε 2 ρ B α 2 ε 2 α 1 , Ξ max = max Ξ 1 , Ξ 2 , Θ 1 = ε 1 χ α 1 ε 1 δ α 2 , Ξ 2 = ε 2 χ α 2 ε 2 α 1 and Θ max = max Θ 1 , Θ 2 . Substituting Equations (19) and (22) into Equation (23), we obtain the OP of U 1 as calculated in Equation (24).
O U 1 L E H = 1 e κ r μ r ψ r Ξ max r = μ r n = 0 κ r n μ r n ψ r n + r Ξ max n + r n ! Γ n + r + 1 × 1 1 Φ 0 , 1 m = 0 n = 0 I 0 , 1 n , m G 1 , 3 2 , 1 Θ max ψ 0 ψ 1 1 m + μ 0 , n + μ 1 , 0 .
When both the relay and U 2 manage to decode the signal s 2 , we denote this outcome as O U 2 o u t . The expression for O U 2 o u t can be derived from Equations (4) and (8) and can be expressed as,
O U 2 L E H = 1 Pr γ r s 2 > ε 2 , γ U 2 s 2 > ε 2 = 1 Pr γ ¯ r > Ξ 2 , γ ¯ 0 , 2 > Θ 2 = 1 1 F γ ¯ r Ξ 2 1 F γ ¯ 0 , 2 Θ 2 ,
where Ξ 2 and Θ 2 are as defined previously. Substituting (19) and (22) into Equation (25), we obtain the OP of U 2 is given by
O U 2 L E H = 1 e κ r μ r ψ r Ξ 2 r = μ r n = 0 κ r n μ r n ψ r n + r Ξ 2 n + r n ! Γ n + r + 1 × 1 1 Φ 0 , 2 m = 0 n = 0 I 0 , 2 n , m G 1 , 3 2 , 1 Θ 2 ψ 0 ψ 2 1 m + μ 0 , n + μ 2 , 0 .

4.2.2. The OP in the Scenario of NLEH

In the scenario of NLEH ι < , the OP at U 1 is expressed as follows:
O U 1 N L E H = 1 Pr α 2 ρ B γ ¯ r α 1 ρ B γ ¯ r + 1 > ε 2 , α 1 ρ B γ ¯ r δ α 2 ρ B γ ¯ r + 1 > ε 1 × Pr α 2 χ γ ¯ 0 , 1 α 1 χ γ ¯ 0 , 1 + 1 > ε 2 , α 1 χ γ ¯ 0 , 1 δ α 2 χ γ ¯ 0 , 1 + 1 > ε 1 , c 0 2 Θ 4 + Pr α 2 χ ˜ c 1 2 α 1 χ ˜ c 1 2 + 1 > ε 2 , α 1 χ ˜ c 1 2 δ α 2 χ ˜ c 1 2 + 1 > ε 1 , c 0 2 > Θ 4 .
The OP at U 1 can be rewritten as follows:
O U 1 N L E H = 1 Pr γ ¯ R > Ξ max × Pr γ ¯ 0 , 1 > Θ max , c 0 2 Θ 4 + Pr c 1 2 > Θ ˜ max , c 0 2 > Θ 4 ,
where Θ ˜ max = max ε 2 χ ˜ α 2 ε 2 α 1 , ε 1 χ ˜ α 1 ε 1 δ α 2 . It is noted that we can rewrite Equation (28) as follows:
O U 1 N L E H = 1 F ¯ γ ¯ r Ξ max × 1 F γ ¯ 0 , 1 Θ max 1 F c 0 2 Θ 4 + F c 1 2 Θ ˜ max F c 0 2 Θ 4 .
Combining Equations (17) and (22), the OP at U 1 with NLEH can be calculated as follows:
O U 1 N L E H = 1 Q μ r 2 κ r μ r , 2 ψ r Ξ max × 1 1 Φ 0 , 1 m = 0 n = 0 I 0 , 1 n , m G 1 , 3 2 , 1 Θ max ψ 0 ψ 1 1 m + μ 0 , n + μ 1 , 0 × 1 Q μ 0 2 κ 0 μ 0 , 2 ψ 0 Θ 4 + Q μ 2 2 κ 1 μ 1 , 2 ψ 1 Θ ˜ max Q μ 0 2 κ 0 μ 0 , 2 ψ 0 Θ 4 .
Finally, the OP at U 2 with NLEH can be given by:
O U 2 N L E H = 1 Pr α 2 ϱ B γ ¯ r α 1 ϱ B γ ¯ r + 1 > ε 2 Pr α 2 χ γ ¯ 0 , 2 α 1 χ γ ¯ 0 , 2 + 1 > ε 2 , h 0 2 Θ 4 + Pr α 2 χ ˜ c 2 2 α 1 χ ˜ c 2 2 + 1 > ε 2 , c 0 2 > Θ 4 = 1 Pr γ ¯ r > Ξ 2 × Pr γ ¯ 0 , 2 > Θ 2 , c 0 2 Θ 4 + Pr c 2 2 > Θ 3 , c 0 2 > Θ 4 .
We have that Equation (31) is eventually simplified as follows:
O U 2 N L E H = 1 F ¯ γ ¯ r Ξ max × 1 F γ ¯ 0 , 2 Θ 2 1 F c 0 2 Θ 4 + F c 2 2 Θ 3 F c 0 2 Θ 4 .
Similarly, by solving for O U 1 N L E H , O U 2 N L E H can be obtained as follows:
O U 2 N L E H = 1 Q μ r 2 κ r μ r , 2 ψ r Ξ 2 × 1 1 Φ 0 , 2 m = 0 n = 0 I 0 , 2 n , m G 1 , 3 2 , 1 Θ 2 ψ 0 ψ 2 1 m + μ 0 , n + μ 2 , 0 × 1 Q μ 0 2 κ 0 μ 0 , 2 ψ 0 Θ 4 + Q μ 2 2 κ 2 μ 2 , 2 ψ 2 Θ 3 Q μ 0 2 κ 0 μ 0 , 2 ψ 0 Θ 4 .

4.3. System Throughput Analysis (STA)

In the delay-limited transmission mode, data are sent from the transmitter R to users at a fixed data rate. During this mode, the transmitter B maintains a steady transmission rate denoted as R, which can be impacted by the occurrence probability of outages owing to fluctuating wireless channel conditions. The relative throughput of the NOMA system is expressed by Equation [22] (Eq. (14)) (refer to (34)).
T s y s t e m = i = 1 2 1 O U i L E H 1 ϱ T T 2 2 T R i = i = 1 2 1 O U i L E H 1 ϱ R i 2 .
Remark 1. 
Because the cumulative throughput depends on the OPs of U i and the desired rate R i , it is upper-bounded by the ceiling i = 1 2 R i . Moreover, power allocation at both the transmitter B and the relay R also contributes to a decrease in throughput due to their detrimental effects on outage performance.

5. Pseudo Code

To offer a better understanding of the power beacon-assisted scheme, a flowchart outlining the methodology is also provided in Figure 3.
From expression (12), the study presents an algorithm for the Monte Carlo simulation with two users ( U i , i 1 , 2 ), detailed in Algorithm 1.
Algorithm 1: The proposed method for Problem-Solving P 2
1. Initialization:
   1.1 Set ¯ = 5 1 2
   1.2 Set ρ min = 0
   1.3 Set ρ max = 1 2 R 2 log 2 1 / α 2
   1.4 Set ν = 10 9
2. While Loop:
   2.1 while ρ max ρ min > ν do:
      2.1.1 Set ρ 1 = ρ max ρ max ρ min ¯
      2.1.2 Set ρ 2 = ρ max + ρ max ρ min ¯
      2.1.3 Obtain O L E H U i ρ 1 from (23) or (25)
      2.1.4 Obtain O L E H U i ρ 2 from (23) or (25)
      2.1.5   If O L E H U i ρ 1 > O L E H U i ρ 2 then
      2.1.5.1   Set ρ max = ρ 2
                      else:
      2.1.5.2   Set ρ min = ρ 1
      2.1.6   end
   2.2 End while
3. Return the Optimal ρ * :
   3.1 Return ρ * = ρ max + ρ min ρ max ρ min 2 2

6. Optimization of the TS Factor to Minimize the OP for Users

This section focuses on optimizing the TS factor ϱ , which is a crucial parameter for effectively balancing the EH and data transmission phases, aiming to minimize the OP of users. Below is the formula for calculating the OP of users:
P 1 : minimize ϱ O U i o u t , i 1 , 2 s . t . 0 < ϱ < 1 2 R 2 2 R 2 log 2 1 1 α 2 α 2 log 2 1 1 α 2 α 2 .
The OP function of U i versus ϱ exhibits an optimal ϱ * on the interval τ , 1 2 R 2 2 R 2 log 2 1 1 α 2 α 2 log 2 1 1 α 2 α 2 τ τ 0 with τ 0 , similar to references [44,45]. The credibility of these convex function characteristics was validated in [46]. However, no supporting evidence is presented. It is reasonable to reformulate the problem outlined in Equation (35) as follows:
P 2 : maximize ϱ O U i o u t s . t . 0 < ϱ < 1 2 R i 2 R i log 2 1 1 α 2 α 2 log 2 1 1 α 2 α 2 .
Given the computational challenges associated with employing gradient methods to solve the formula expression P 2 , we utilize the Golden Section Search technique, as elaborated in Table 2. Here, ν represents the search accuracy, while O log 2 1 / ν indicates the complexity of the method, as stated in the work by Nguyen in [21]. This technique is widely acknowledged for its combination of high precision and low computational complexity, as highlighted by Nguyen. Furthermore, Nguyen demonstrated that for unimodal functions, this method consistently achieves convergence to the global optimum.

7. Energy Efficiency

To enhance throughput in delay-constrained transmission scenarios, further research is crucial to explore the energy efficiency of C-NOMA systems. The necessity for additional studies is highlighted by the reference in [17] (Eq. (52)), which indicates that the formula for the energy efficiency coefficient can yield valuable insights into the performance metrics of these systems. Therefore, examining the details of this coefficient can provide a deeper understanding of how C-NOMA setups can optimize energy consumption while maintaining high throughput levels. The energy efficiency coefficient can be expressed as follows:
η E E = Total data rate Total energy consumption .
Consequently, the energy efficiency metrics of C-NOMA systems can be redefined as follows:
η s y s t e m E E = T s y s t e m T P B + T P R ,
In this context, the variable T represents the duration of the transmission procedure, covering all aspects of the communication process.

8. Simulation Results

In this section, we evaluate the OP and throughput of the proposed system through analytical analysis, supplemented by simulation results obtained using the Monte Carlo method to validate our analytical findings. The parameters of the κ μ random variables are assumed to be identical, namely κ = κ R = κ 0 = κ 1 = κ 2 and μ = μ R = μ 0 = μ 1 = μ 2 , with Ω = Ω R = Ω 0 = Ω 1 = Ω 2 = 1 . Unless otherwise stated, all simulation configurations are provided in Table 4. Moreover, we employed the κ μ fading model, and a variety of examples can be found in Table 5. For scenarios involving NLEH, we set ι = 0 dBm and N 0 = 90 dBm as specified in [47].
The two κ μ random variables associated with the EH-NOMA system discussed in Section 3 are clearly depicted in Figure 4. This visualization illustrates that the simulation outcomes closely align with the numerical analysis we conducted, which was derived from simulation data.
Figure 5 shows the representation of OP according to ρ B in a cooperative NOMA system with different κ and μ values. Specifically, Figure 5a presents the OP of the Rice distribution ( μ = 1 ) versus two values κ = 1 and κ = 4 . From the figure, it can be observed that the larger the κ , the better the OP of the system. A similar explanation is provided for Figure 5b for the Nakagami-m distribution ( κ 0 ) versus two values μ = 1 and μ = 3 . From the figure, we can also see that the larger the value of μ , the lower the OP. These results can be explained based on Equations (23)–(26). Generally, the alignment between simulation results and analytical results in NOMA systems can be attributed to several key factors: accurate user pairing, optimized power allocation, and precise interference management through SIC. These elements collectively enhance the predictability and stability of the channel environment, ensuring that theoretical models closely match simulations.
Figure 6 findings are identical to Figure 5 in terms of general channel characteristics; we can see that for the situation, NLEH will be better than LEH, as shown in Figure 5.
The the OP values for U 1 and U 2 as a function of ρ B are presented in Figure 7a and Figure 7b respectively. The figure reveals that the Nakagami-m distribution has the lowest OP value, while the One-sided Gaussian distribution has the highest OP value. This suggests that the transmission line with the Nakagami-m distribution is the most stable. This observation can also be explained using Equations (23)–(26).
Upon applying NLEH, an enhancement in outage performance for the downlink scenario is apparent in Figure 8. Here, we set δ = 0.05 . It is notable that as the SNR ρ B during transmission increases, a considerable gap emerges between the outage probabilities attained by the linear and non-linear EH models. This disparity arises due to the extended duration required for EH to accumulate the minimum power influenced by ι , consequently diminishing the OP.
Figure 9 illustrates OP versus the power allocation factor a 2 , where a larger value of ρ B indicates better optimization. Based on the figure, we observe that the OP occurs at U 1 when the ipSIC ceases to function entirely within the α 2 range from 0.86 to 1. Similarly, the OP occurs at U 1 in the case of pSIC complete outage within the α 2 range from 0.97 to 1. These observations can be explained similarly to Figure 3 and Figure 4, as well as based on Equations (23)–(26).
Figure 10 plots the OP versus ϱ for various target rate values, with parameters δ = 0.02 , α 1 = 0.1 , α 2 = 0.9 , κ = 0 , and μ = 3 . Specifically, as the target rate values change from R 1 = R 2 = 0.2 to R 1 = R 2 = 0.5 , the OP also increases. We can explain these observations based on Equations (23)–(26).
Figure 11 describes the OP at U 1 and U 2 versus target rate values ( R 1 = R 2 ). Specifically, the figure illustrates that OP increases with increasing target rate values.
Figure 12 illustrates the ST at the destination node versus ϱ , where R 1 = 0.5 , R 2 = 0.25 , α 1 = 0.3 , α 2 = 0.7 , κ = 0 , and μ = 2 . The exact theoretical curves of the system throughput are plotted according to Equation (21). From the graph, it is evident that the system throughput increases as the value of ρ B increases. When ρ B changes from 10 [dB] to 15 [dB], the maximum system throughput nearly doubles. Additionally, the system throughput is dependent on δ , with δ = 0 corresponding to the dashed line and δ = 0.05 corresponding to the solid line. As δ increases at the same value of ρ B , the system throughput decreases rapidly, and vice versa. This implies that the quality of the system is dependent on the quality of the SIC.
In Figure 13, we adjust the simulation settings to match those in [36], and the outage probability of an energy harvesting-based NOMA system falls dramatically in the high SNR zone. Such patterns in outage performance are observed for both time switching and power splitting systems, which are consistent with our findings. However, target rates remain a restriction of our proposed system’s outage performance, as indicated in [36]. It is concluded that our relay-based NOMA system outperforms that of [36] in terms of outage performance in the case of time-switching energy harvesting at SNRs greater than 20 dB.
We show the outage probability at the users versus ρ for the LEH and NLEH cases in Figure 14. It can be noted that when ρ increases, the NOMA system’s outage performance improves. This is because a greater ρ corresponds to a higher diversity order for each user, resulting in a reduced outage probability. Furthermore, the study in Figure 8 shows that the users in the NLEH scenario outperform those in the LEH case.
Figure 15 illustrates the relationship between system energy efficiency and SNR when operating in delay-limited transmission mode for user relaying within NOMA systems. The plotted graph includes dashed curves representing the performance of two users relaying NOMA with the LEH scenario, derived from Equations (24) and (26) based on throughput in delay-limited transmission mode. Additionally, solid curves on the graph depict the results for two users relaying NOMA with the NLEH setup, calculated using Equations (A1) and (A4) considering throughput in transmission mode.
Upon observation, it becomes apparent that the energy efficiency of user relaying in NLEH NOMA during delay-limited transmission mode exhibits a higher throughput compared to that of LEH NOMA under similar transmission conditions. Through the comparison of these scenarios, it is evident that the NLEH configuration offers improved energy efficiency for user relaying within NOMA systems, particularly in delay-limited transmission mode. The findings from the plotted curves emphasize the advantages of utilizing NLEH over LEH in terms of energy efficiency and throughput performance when implementing user relaying in NOMA systems. This insight underscores the significance of considering different energy harvesting mechanisms in NOMA setups to enhance system performance and efficiency.

9. Conclusions

This paper investigates the DF relay-based protocol for EH and IP in wireless C-NOMA relaying networks. We derived closed-form expressions for the OP, ST, and the optimal TS factor to minimize OP for two users. Additionally, expressions for achievable OP, ST, and the optimal TS factor for users of the TSR protocol for SWIPT were obtained. Analytical and simulation results consistently demonstrate the superiority of the Nakagami-m fading channel over other fading channels in terms of energy efficiency performance. For instance, simulations with parameters such as κ = 0 , μ = 3 , and SNR ranging from 10 dB to 20 dB showed up to 20% lower outage probabilities compared to Rice and One-sided Gaussian channels. Despite these promising findings, our study is not without limitations. One limitation is the assumption of identical parameters ( κ = κ R = κ 0 = κ 1 = κ 2 and μ = μ R = μ 0 = μ 1 = μ 2 ) across different scenarios, which may not fully capture real-world variations in channel conditions. Additionally, while our simulations provide valuable insights, they are based on specific configurations and may not generalize to all practical deployment scenarios. Moving forward, we propose the development of a C-NOMA network system utilizing multiple-input-multiple-output (MIMO) NOMA to further enhance system performance and address these limitations. This avenue presents promising opportunities for future research and practical implementation, aiming to optimize wireless communication networks through advanced NOMA techniques.

Author Contributions

Conceptualization, H.Q.T., S.N.S. and B.M.L.; methodology, H.Q.T.; software, H.Q.T.; validation, H.Q.T.; formal analysis, H.Q.T.; investigation, H.Q.T.; resources, H.Q.T.; data curation, H.Q.T.; writing—original draft preparation, H.Q.T.; writing—review and editing, H.Q.T., S.N.S. and B.M.L.; visualization, H.Q.T.; supervision, H.Q.T., S.N.S. and B.M.L.; project administration, H.Q.T. and B.M.L.; funding acquisition, B.M.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by Korea government (MSIT) under Grant NRF-2023R1A2C1002656, supported by the MSIT (Ministry of Science and ICT), Korea under Grant IITP-2024-RS-2022-00156345 (ICT Challenge and Advanced Network of HRD Program), and supported by the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program (IITP-2024-RS-2024-00437494) supervised by the IITP(Institute for Information & Communications Technology Planning & Evaluation).

Data Availability Statement

The data will be made available by the authors on request.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. Proof of Equation (21)

Proof. 
By replacing G 0 , 2 2 , 0 z b c = 2 z 1 2 b + c K b c 2 z in Equation (17), where K j . is the jth-order modified Bessel function of the second kind, we obtain (see Equation (A1)).
f X 0 , l s = 2 Φ 0 , l m = 0 n = 0 μ 0 κ 0 m μ l κ l n Ψ 0 Ψ l Θ 3 2 n ! m ! Γ m + μ 0 Γ n + μ l s 1 2 2 + Θ 3 K m n + μ 0 μ l 2 s A 0 A l ,
where A 0 = 1 Ψ 0 , A l = 1 Ψ l , Φ 0 , l = e μ 0 κ 0 + μ l κ l and Θ 3 = m + n + μ 0 + μ l . Now, change the order of summation, then change the index m to j + n to obtain the desired result
f X 0 , l s = 2 Φ 0 , l n = 0 j = n μ 0 κ 0 j + n μ l κ l n Ψ 0 Ψ l Θ 1 2 n ! j + n ! Γ j + n + μ 0 Γ n + μ l s 1 2 2 + Θ 1 K j + μ 0 μ l 2 s A 0 A l ,
where Θ 1 = j + 2 n + μ 0 + μ l , the inner series expressed in Equation (A2) as j = n α j = j = n 1 α j + j = 0 α j we obtain Equation (A3)
f X 0 , l s = 2 Φ 0 , l n = 0 j = n 1 μ 0 κ 0 j + n μ l κ l n Ψ 0 Ψ l Θ 1 2 n ! j + n ! Γ j + n + μ 0 Γ n + μ l s 1 2 2 + Θ 1 K j + μ 0 μ l 2 s A 0 A l + j = 0 μ 0 κ 0 j + n μ l κ l n Ψ 0 Ψ l Θ 1 2 n ! j + n ! Γ j + n + μ 0 Γ n + μ l s 1 2 2 + Θ 1 K j + μ 0 μ l 2 s A 0 A l .
By changing the index in the first summation of Equation (A4), we have j = j n .
f X 0 , l s = 2 Φ 0 , l n = 0 j = n 1 μ 0 κ 0 j + n μ l κ l n Ψ 0 Ψ l Θ 1 2 n ! j + n ! Γ j + n + μ 0 Γ n + μ l s 1 2 2 + Θ 1 K j + μ 0 μ l 2 s A 0 A l + j = 0 μ 0 κ 0 j + n μ l κ l n Ψ 0 Ψ l Θ 1 2 n ! j + n ! Γ j + n + μ 0 Γ n + μ l s 1 2 2 + ξ 1 K j + μ 0 μ l 2 s A 0 A l .
The inner series in Equation (33) is reformulated as j = 0 n 1 α j = j = 0 n α j α n . The first and last sums are then represented using the regularized hypergeometric function [43], leading to the result displayed below Equation (A5).
f X 0 , l s = 2 Φ 0 , l n = 0 j = 0 n 1 μ 0 κ 0 j μ l κ l n Ψ 0 Ψ l Θ 2 2 n ! j ! Γ j + μ 0 Γ n + μ l s 1 2 2 + Θ 2 K j n + μ 0 μ l 2 s A 0 A l + j = 0 μ 0 κ 0 j + n μ l κ l n Ψ 0 Ψ l Θ 1 2 n ! j + n ! Γ j + n + μ 0 Γ n + μ l s 1 2 2 + ξ 1 K j + μ 0 μ l 2 s A 0 A l ,
Here, ζ 0 = s μ 0 κ 0 μ l κ l A 0 A l and Θ = j + μ 0 + μ l . The PDF of the double κ μ fading channel [49], as shown in Equation (21), is derived using a simplification technique similar to that applied earlier for the double summation in Equation (A6). This involves modifying the index n, summing over n = n + j , and performing some algebraic manipulations, resulting in (refer to Equation (A6)).
f X 0 , l s = 2 Ψ 0 Ψ l μ 0 2 + μ l 2 Φ 0 , l s 1 + μ 0 2 + μ l 2 K μ 0 μ l 2 s A 0 A l F ˜ 3 0 ; 1 , μ 0 , μ l ; ζ 0 + 2 Φ 0 , l n = 0 j = 0 n μ 0 κ 0 j μ l κ l n Ψ 0 Ψ l Θ 2 2 n ! j ! Γ j + μ 0 Γ n + μ l s 1 2 2 + Θ 2 K j n + μ 0 μ l 2 s A 0 A l + 2 Φ 0 , l j = 0 μ 0 κ 0 j Ψ 0 Ψ l Θ 2 s 1 + Θ 2 K j + μ 0 μ l 2 x A 0 A l F ˜ 3 0 ; 1 + j , j + μ 0 , μ l ; ζ 0 .
This completes the proof. □

References

  1. Dai, L.; Wang, B.; Ding, Z.; Wang, Z.; Chen, S.; Hanzo, L. A Survey of Non-Orthogonal Multiple Access for 5G. IEEE Commun. Surv. Tutor. 2018, 20, 2294–2323. [Google Scholar] [CrossRef]
  2. Makki, B.; Chitti, K.; Behravan, A.; Alouini, M.-S. A Survey of NOMA: Current Status and Open Research Challenges. IEEE Open J. Commun. Soc. 2020, 1, 179–189. [Google Scholar] [CrossRef]
  3. Al-habob, A.A.; Salhab, A.M.; Zummo, S.A. A Novel Time-Switching Relaying Protocol for Multi-user Relay Networks with SWIPT. Arab. J. Sci. Eng. 2019, 44, 2253–2263. [Google Scholar] [CrossRef]
  4. Tran, H.Q.; Phan, C.V.; Vien, Q.T. Power splitting versus time switching based cooperative relaying protocols for SWIPT in NOMA systems. Phys. Commun. 2020, 41, 101098. [Google Scholar] [CrossRef]
  5. Tran, H.Q.; Phan, C.V.; Vien, Q.T. Performance analysis of power-splitting relaying protocol in SWIPT based cooperative NOMA systems. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 110. [Google Scholar] [CrossRef]
  6. Tran, H.Q.; Vien, Q.T. SWIPT-Based Cooperative NOMA for Two-Way Relay Communications: PSR versus TSR. Wirel. Commun. Mob. Comput. 2023, 2023, 3069999. [Google Scholar] [CrossRef]
  7. Alhamad, R.; Boujemaa, H. Non Orthogonal Multiple Access for Multi-carrier Code Division Multiple Access Systems with Energy Harvesting. Wirel. Pers. Commun. 2024, 134, 2121–2136. [Google Scholar] [CrossRef]
  8. Ogundokun, R.O.; Awotunde, J.B.; Imoize, A.L.; Li, C.-T.; Abdulahi, A.T.; Adelodun, A.B.; Sur, S.N.; Lee, C.-C. Non-Orthogonal Multiple Access Enabled Mobile Edge Computing in 6G Communications: A Systematic Literature Review. Sustainability 2023, 15, 7315. [Google Scholar] [CrossRef]
  9. Islam, S.M.; Avazov, N.; Dobre, O.A.; Kwak, K.S. Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges. IEEE Commun. Surv. Tutor. 2017, 19, 721–742. [Google Scholar] [CrossRef]
  10. Dai, L.; Wang, B.; Yuan, Y.; Han, S.; I, C.L.; Wang, Z. Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends. IEEE Commun. Mag. 2015, 53, 74–81. [Google Scholar] [CrossRef]
  11. Tran, H.Q.; Truong, P.Q.; Phan, C.V.; Vien, Q.T. On the energy efficiency of NOMA for wireless backhaul in multi-tier heterogeneous CRAN. In Proceedings of the 2017 International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom), Da Nang, Vietnam, 9–11 January 2017; pp. 229–234. [Google Scholar] [CrossRef]
  12. Sur, S.N.; Kandar, D.; Silva, A.; Nguyen, N.D.; Nandi, S.; Do, D.-T. Hybrid Precoding Algorithm for Millimeter-Wave Massive MIMO-NOMA Systems. Electronics 2022, 11, 2198. [Google Scholar] [CrossRef]
  13. Ding, Z.; Lei, X.; Karagiannidis, G.K.; Schober, R.; Yuan, J.; Bhargava, V.K. A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends. IEEE J. Sel. Areas Commun. 2017, 35, 2181–2195. [Google Scholar] [CrossRef]
  14. Tsiropoulos, G.I.; Yadav, A.; Zeng, M.; Dobre, O.A. Cooperation in 5G HetNets: Advanced Spectrum Access and D2D Assisted Communications. IEEE Wirel. Commun. 2017, 24, 110–117. [Google Scholar] [CrossRef]
  15. Zhang, Z.; Ma, Z.; Xiao, M.; Ding, Z.; Fan, P. Full-duplex device-to-device-aided cooperative nonorthogonal multiple access. IEEE Trans. Veh. Technol. 2017, 66, 4467–4471. [Google Scholar] [CrossRef]
  16. Wang, Z.; Yue, X.; Peng, Z. Full-duplex user relaying for NOMA system with self-energy recycling. IEEE Access 2018, 6, 67057–67069. [Google Scholar] [CrossRef]
  17. Yue, X.; Liu, Y.; Kang, S.; Nallanathan, A.; Ding, Z. Exploiting Full/Half-Duplex User Relaying in NOMA Systems. IEEE Trans. Commun. 2018, 66, 560–575. [Google Scholar] [CrossRef]
  18. Abbasi, O.; Ebrahimi, A. Cooperative NOMA with full-duplex amplify-and-forward relaying. Trans. Emerg. Telecommun. Technol. 2018, 29, e3421. [Google Scholar] [CrossRef]
  19. Yang, Z.; Ding, Z.; Wu, Y.; Fan, P. Novel Relay Selection Strategies for Cooperative NOMA. IEEE Trans. Veh. Technol. 2017, 66, 10114–10123. [Google Scholar] [CrossRef]
  20. Duan, W.; Ju, J.; Hou, J.; Sun, Q.; Jiang, X.Q.; Zhang, G. Effective resource utilization schemes for decode-and-forward relay networks with NOMA. IEEE Access 2019, 7, 51466–51474. [Google Scholar] [CrossRef]
  21. Doan, T.B.; Nguyen, T.H. Exploiting SWIPT for Coordinated-NOMA Systems Under Nakagami-m Fading. IEEE Access. 2024, 12, 19216–19228. [Google Scholar] [CrossRef]
  22. Nasir, A.A.; Zhou, X.; Durrani, S.; Kennedy, R.A. Relaying Protocols for Wireless Energy Harvesting and Information Processing. IEEE Trans. Wirel. Commun. 2013, 12, 3622–3636. [Google Scholar] [CrossRef]
  23. Dubey, S.; Mehra, N.; Shakya, D.K. Time and relay shared full/half duplex cooperative NOMA with paired cell edge users. AEU-Int. J. Electron. Commun. 2024, 177, 155168. [Google Scholar] [CrossRef]
  24. Chu, T.M.C.; Zepernick, H.J. Performance of a Non-Orthogonal Multiple Access System with Full-Duplex Relaying. IEEE Commun. Lett. 2018, 22, 2084–2087. [Google Scholar] [CrossRef]
  25. Mohammadi, M.; Chalise, B.K.; Hakimi, A.; Suraweera, H.A.; Ding, Z. Joint Beamforming Design and Power Allocation for Full-Duplex NOMA Cognitive Relay Systems. In Proceedings of the 2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar] [CrossRef]
  26. Guo, C.; Zhao, L.; Feng, C.; Ding, Z.; Wang, H.-M. Secrecy Performance of NOMA Systems With Energy Harvesting and Full-Duplex Relaying. IEEE Trans. Veh. Technol. 2020, 69, 12301–12305. [Google Scholar] [CrossRef]
  27. Guo, C.; Zhao, L.; Feng, C.; Ding, Z.; Chen, H.-H. Energy Harvesting Enabled NOMA Systems With Full-Duplex Relaying. IEEE Trans. Veh. Technol. 2019, 68, 7179–7183. [Google Scholar] [CrossRef]
  28. Singh, C.K.; Upadhyay, P.K. Overlay Cognitive IoT-Based Full-Duplex Relaying NOMA Systems With Hardware Imperfections. IEEE Internet Things J. 2022, 9, 6578–6596. [Google Scholar] [CrossRef]
  29. Rauniyar, A.; Engelstad, P.E.; Østerbø, O.N. On the Performance of Bidirectional NOMA-SWIPT Enabled IoT Relay Networks. IEEE Sens. J. 2021, 21, 2299–2315. [Google Scholar] [CrossRef]
  30. Sixtus J, R.J.; Muthu, T. Investigations on IoT with SWIPT-NOMA Combination in Wireless Sensor Networks. In Proceedings of the 2022 International Conference on Inventive Computation Technologies (ICICT), Lalitpur, Nepal, 20–22 July 2022; pp. 688–693. [Google Scholar] [CrossRef]
  31. Shaheen, E.M.; Soleymani, M.R. Performance Analyses of SWIPT-NOMA Enabled IoT Relay Networks. In Proceedings of the 2022 International Symposium on Networks, Computers and Communications (ISNCC), Shenzhen, China, 19–22 July 2022; pp. 1–6. [Google Scholar] [CrossRef]
  32. Al-Obiedollah, H.; Salameh, H.B.; Gharaibeh, A.; Cumanan, K.; Ding, Z.; Dobre, O.A. Harvested Power Fairness-Based Multi-Carrier NOMA IoT Networks With SWIPT. IEEE Wirel. Commun. Lett. 2023, 12, 381–385. [Google Scholar] [CrossRef]
  33. Do, D.-T.; Le, C.-B.; Afghah, F. Enabling Full-Duplex and Energy Harvesting in Uplink and Downlink of Small-Cell Network Relying on Power Domain Based Multiple Access. IEEE Access 2020, 8, 142772–142784. [Google Scholar] [CrossRef]
  34. Do, D.-T.; Le, C.-B.; Le, A.-T. Joint of full-duplex relay, non-linear energy harvesting and multiple access in performance improvement of cell-edge user in heterogeneous networks. Wirel. Netw. 2020, 26, 6253–6266. [Google Scholar] [CrossRef]
  35. Babaei, M.; Aygolu, U.; Basar, E. Cooperative AF relaying with energy harvesting in Nakagami- fading channel. Phys. Commun. 2019, 34, 105–113. [Google Scholar] [CrossRef]
  36. Li, X.; Huang, M.; Zhang, C.; Deng, D.; Rabie, K.M.; Ding, Y.; Du, J. Security and Reliability Performance Analysis of Cooperative Multi-Relay Systems With Nonlinear Energy Harvesters and Hardware Impairments. IEEE Access 2019, 7, 102644–102661. [Google Scholar] [CrossRef]
  37. Le, A.-T.; Tran, D.-H.; Le, C.-B.; Tin, P.T.; Nguyen, T.N.; Ding, Z.; Poor, H.V.; Voznak, M. Power Beacon and NOMA-Assisted Cooperative IoT Networks With Co-Channel Interference: Performance Analysis and Deep Learning Evaluation. IEEE Trans. Mob. Comput. 2024, 23, 7270–7283. [Google Scholar] [CrossRef]
  38. Solanki, S.; Upadhyay, P.K.; da Costa, D.B.; Ding, H.; Moualeau, J.M. Performance analysis of piece-wise linear model of energy harvesting-based multiuser overlay spectrum sharing networks. IEEE Open J. Commun. Soc. 2020, 1, 1820–1836. [Google Scholar] [CrossRef]
  39. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series and Products, 7th ed.; Academic: San Diego, CA, USA, 2007. [Google Scholar]
  40. Karagiannidis, G.K.; Sagias, N.C.; Mathiopoulos, P.T. N–Nakagami: A novel stochastic model for cascaded fading channels. IEEE Trans. Commun. 2007, 55, 1453–1458. [Google Scholar] [CrossRef]
  41. Nadarajah, S. Exact distribution of the product of m gamma and n Pareto random variables. J. Comput. Appl. Math. 2011, 235, 4496–4512. [Google Scholar] [CrossRef]
  42. Simon, M.K.; Alouini, M.-S. Digital Communication over Fading Channels; John Wiley & Sons: Hoboken, NJ, USA, 2005. [Google Scholar]
  43. Weisstein, E. Regularized Hypergeometric Function, 3rd ed.; Wolfram Research, Inc.: Champaign, IL, USA, 2003. [Google Scholar]
  44. Rauniyar, A.; Engelstad, P.; Østerbø, O.N. RF energy harvesting and information transmission in IoT relay systems based on time switching and NOMA. In Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), Sydney, NSW, Australia, 21–23 November 2018; pp. 1–7. [Google Scholar] [CrossRef]
  45. Rauniyar, A.; Engelstad, P.E.; Østerbø, O.N. Performance analysis of RF energy harvesting and information transmission based on NOMA with interfering signal for IoT relay systems. IEEE Sens. J. 2019, 19, 7668–7682. [Google Scholar] [CrossRef]
  46. Pei, L.; Yang, Z.; Pan, C.; Huang, W.; Chen, M.; Elkashlan, M.; Nallanathan, A. Energy-efficient D2D communications underlaying NOMA-based networks with energy harvesting. IEEE Commun. Lett. 2018, 22, 914–917. [Google Scholar] [CrossRef]
  47. Le-Thanh, T.; Ho-Van, K. Performance Analysis of Wireless Communications with Nonlinear Energy Harvesting under Hardware Impairment and κμ Shadowed Fading. Sensors 2023, 23, 3619. [Google Scholar] [CrossRef]
  48. Paris, J.F. Statistical Characterization of κμ Shadowed Fading. IEEE Trans. Veh. Technol. 2014, 63, 518–526. [Google Scholar] [CrossRef]
  49. Yacoub, M. The κμ distribution and the ημ distribution. IEEE Antennas Propag. Mag. 2007, 49, 68–81. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Mathematics 12 02249 g001
Figure 2. A time-power EH Scheme.
Figure 2. A time-power EH Scheme.
Mathematics 12 02249 g002
Figure 3. The flowchart for calculating the primary system metrics for the power beacon-assisted scheme.
Figure 3. The flowchart for calculating the primary system metrics for the power beacon-assisted scheme.
Mathematics 12 02249 g003
Figure 4. Visualization of the derived closed-form expression for the PDF and CDF, alongside the graphical representation of the predicted actual distributions.
Figure 4. Visualization of the derived closed-form expression for the PDF and CDF, alongside the graphical representation of the predicted actual distributions.
Mathematics 12 02249 g004
Figure 5. OP versus ρ B with LEH for the Cooperative NOMA system with varying κ and μ values.
Figure 5. OP versus ρ B with LEH for the Cooperative NOMA system with varying κ and μ values.
Mathematics 12 02249 g005
Figure 6. OP versus ρ B with NLEH for the Cooperative NOMA system with different κ and μ values.
Figure 6. OP versus ρ B with NLEH for the Cooperative NOMA system with different κ and μ values.
Mathematics 12 02249 g006
Figure 7. OP of U 1 and U 2 versus ρ B for different fading channels, with δ = 0.1 .
Figure 7. OP of U 1 and U 2 versus ρ B for different fading channels, with δ = 0.1 .
Mathematics 12 02249 g007
Figure 8. Comparison performance related to downlink between NLEH and LEH case, with δ = 0.05 .
Figure 8. Comparison performance related to downlink between NLEH and LEH case, with δ = 0.05 .
Mathematics 12 02249 g008
Figure 9. OP versus power allocation factors, with the parameters δ = 0.05 , κ = 3 , and μ = 1 .
Figure 9. OP versus power allocation factors, with the parameters δ = 0.05 , κ = 3 , and μ = 1 .
Mathematics 12 02249 g009
Figure 10. The OP versus ϱ for different target rate values, with the parameters δ = 0.02 , α 1 = 0.1 , α 2 = 0.9 , κ = 0 , and μ = 3 .
Figure 10. The OP versus ϱ for different target rate values, with the parameters δ = 0.02 , α 1 = 0.1 , α 2 = 0.9 , κ = 0 , and μ = 3 .
Mathematics 12 02249 g010
Figure 11. The OP versus the target rates, with the parameters δ = 0.05 , α 1 = 0.2 , α 2 = 0.8 , κ = 3 , and μ = 1 .
Figure 11. The OP versus the target rates, with the parameters δ = 0.05 , α 1 = 0.2 , α 2 = 0.8 , κ = 3 , and μ = 1 .
Mathematics 12 02249 g011
Figure 12. The ST at the destination node with respect to ϱ , with the parameters R 1 = 0.5 , R 2 = 0.25 , α 1 = 0.3 , α 2 = 0.7 , κ = 0 , and μ = 2 .
Figure 12. The ST at the destination node with respect to ϱ , with the parameters R 1 = 0.5 , R 2 = 0.25 , α 1 = 0.3 , α 2 = 0.7 , κ = 0 , and μ = 2 .
Mathematics 12 02249 g012
Figure 13. A comparison of the results presented in [36] regarding outage probability, with the parameters R 1 = 0.5 , R 2 = 0.25 , α 1 = 0.3 , α 2 = 0.7 , κ = 0 , and μ = 4 .
Figure 13. A comparison of the results presented in [36] regarding outage probability, with the parameters R 1 = 0.5 , R 2 = 0.25 , α 1 = 0.3 , α 2 = 0.7 , κ = 0 , and μ = 4 .
Mathematics 12 02249 g013
Figure 14. The outage probabilities at the other users versus ρ B .
Figure 14. The outage probabilities at the other users versus ρ B .
Mathematics 12 02249 g014
Figure 15. System energy efficiency in delay-limited transmission mode, where a 1 = 0.1 , a 2 = 0.9 , κ = 4 , μ = 1 , P B = P R = 10 W and T = 1 .
Figure 15. System energy efficiency in delay-limited transmission mode, where a 1 = 0.1 , a 2 = 0.9 , κ = 4 , μ = 1 , P B = P R = 10 W and T = 1 .
Mathematics 12 02249 g015
Table 1. Comparison between the novelty of our work and previous papers (X: Not Discussed; ✓: Discussed.
Table 1. Comparison between the novelty of our work and previous papers (X: Not Discussed; ✓: Discussed.
Our Scheme[33][34][4][5][6][35][36][37]
NOMAXX
Multiple RelayXXXXXXXX
Energy harvesting
Generalized channelsXXXXXXXX
Full-DuplexXXXXXXX
Power beaconXXXXXX
AFXXXXXXXX
DFX
Outage ProbabilityX
ThroughputX
OptimizationXXXXXX
Table 2. Abbreviations and Acronyms.
Table 2. Abbreviations and Acronyms.
AcronymDefinition
6GSix-generation
AFAmplify and decode
AWGNAdditive white gaussian noise
CDFCumulative distribution function
C-NOMACooperative non-orthogonal multiple access
CSSTCooperative spectrum-sharing transmission
D2DDevice to device
DFDecode and forward
DLTDelay-limited transmission
EHEnergy harvesting
FDFull-duplex
HDHalf-duplex
IoTInternet of things
IPInformation processing
ipSICImperfect SIC
LEHLinear energy harvesting
NLEHNonlinear energy harvesting
OFDMOrthogonal frequency division multiple access
OFDMAOrthogonal frequency division multiple access
OMAOrthogonal multiple access
OPOutage probability
PDFProbability density function
pSICPerfect SIC
QoSQuality of service
RMSRoot-mean-square
RVsRandom variables
SCSuperimposed coding
SICSuccessive interference cancellation
STSystem throughput
SINRsignal-to-plus-noise ratio
SNRsignal-to-noise ratio
SWIPTSimultaneous wireless information and power transfer
TSRTime-switching receiver
Table 3. Simulation Parameters.
Table 3. Simulation Parameters.
ParametersDescription
R i The target rate is set at U i , where i belongs to the set 1 , 2 .
s i U i ’s information
ε i U i ’s threshold rate.
α i Power allocation coefficients at U i .
n R & n U i The AWGN term was succeeded by C N ( 0 , N 0 ) .
P B Transmit power at BS.
P r Transmit power at R
TThe total time used for EH and IP.
ϱ Time-switching factor.
η The EH efficiency.
eSubindex for defining the e t h RV. Here, e R , 0 , 1 , 2
κ e The ratio of the dispersed waves to the total power of the dominant components.
μ e An extension utilizing real values that are linked to the quantity of multipath clusters.
r ^ e The root-mean-square (RMS) value of the received signal envelope.
r ¯ e The average value of the received signal envelope.
γ e The instantaneous signal-to-noise ratio (SNR).
Ω e The average SNR.
Ξ e The shaping parameter refers to a crucial aspect of a Nakagami-m RV.
Δ e The rate parameter (also known as the inverse scale parameter) represents an optimistic measure of a Gamma RV.
Table 4. Definition of system parameters.
Table 4. Definition of system parameters.
ParametersNotationsValues
Power splitting factors α 1 , α 2 0.3 , 0.7
Threshold data rate at U 1 R 1 0.5 Bit/s/Hz
Threshold data rate at U 2 R 2 0.25 Bit/s/Hz
Time-switching factor ϱ 0.5
Coherence time blockT1
Interference factor δ 0.05
Energy conversion efficiency η 0.8
Monte-Carlo sample 10 6
Table 5. The κ μ distribution yields common fading distributions [48].
Table 5. The κ μ distribution yields common fading distributions [48].
Channels κ μ Distribution Parameters
Rayleigh μ = 1 , κ 0
One-sided Gaussian μ = 0.5 , κ 0
Nakagami-m μ = m , κ 0
Rician with parameter K μ = 1 , κ = K
κ μ μ = μ , κ = κ
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Tran, H.Q.; Sur, S.N.; Lee, B.M. A Comprehensive Analytical Framework under Practical Constraints for a Cooperative NOMA System Empowered by SWIPT IoT. Mathematics 2024, 12, 2249. https://doi.org/10.3390/math12142249

AMA Style

Tran HQ, Sur SN, Lee BM. A Comprehensive Analytical Framework under Practical Constraints for a Cooperative NOMA System Empowered by SWIPT IoT. Mathematics. 2024; 12(14):2249. https://doi.org/10.3390/math12142249

Chicago/Turabian Style

Tran, Huu Q., Samarendra Nath Sur, and Byung Moo Lee. 2024. "A Comprehensive Analytical Framework under Practical Constraints for a Cooperative NOMA System Empowered by SWIPT IoT" Mathematics 12, no. 14: 2249. https://doi.org/10.3390/math12142249

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop