Next Article in Journal
Image Noise Reduction and Solution of Unconstrained Minimization Problems via New Conjugate Gradient Methods
Previous Article in Journal
Mathematical Model for Optimal Agri-Food Industry Residual Streams Flow Management: A Valorization Decision Support Tool
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Analysis of a New Non-Orthogonal Multiple Access Design for Mitigating Information Loss

1
Department of Information and Communication Engineering, Sejong University, Seoul 05006, Republic of Korea
2
Department of Convergence Engineering for Intelligent Drone, Sejong University, Seoul 05006, Republic of Korea
3
Department of Computer Engineering, Sejong University, Seoul 05006, Republic of Korea
4
Department of Artificial Intelligence and Data Science, Sejong University, Seoul 05006, Republic of Korea
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(17), 2752; https://doi.org/10.3390/math12172752
Submission received: 16 August 2024 / Revised: 26 August 2024 / Accepted: 4 September 2024 / Published: 5 September 2024

Abstract

:
This paper proposes a scheme that adds XOR bit operations into the encoding and decoding process of the conventional non-orthogonal multiple access (NOMA) system to alleviate performance degradation caused by the power distribution of the original signal. Because the conventional NOMA combines and sends multiple data within limited resources, it has a higher data rate than orthogonal multiple access (OMA), at the expense of error performance. However, by using the proposed scheme, both error performance and sum rate can be improved. In the proposed scheme, the transmitter sends the original data and the redundancy data in which the exclusive OR (XOR) values of the data are compressed using the superposition coding (SC) technique. After this process, the data rate of users decreases due to redundancy data, but since the original data are sent without power allocation, the data rate of users with poor channel conditions increases compared to the conventional NOMA. As a result, the error performance and sum rate of the proposed scheme are better than those of the conventional NOMA. Additionally, we derive an exact closed-form bit error rate (BER) expression for the proposed downlink NOMA design over Rayleigh fading channels.

1. Introduction

Non-orthogonal multiple access (NOMA) is a promising technology to increase the spectral efficiency of next-generation communication systems [1,2]. Unlike orthogonal multiple access (OMA), which transmits only one data point in one resource block (RB), NOMA can transmit multiple data in one resource block at once. Therefore, NOMA is a promising technology that can enhance the overall system data rate [3]. Among the various NOMA techniques, power-domain NOMA (PD-NOMA), which utilizes power as a resource to transmit multiple data streams simultaneously, is currently receiving significant research attention [4]. The key techniques of PD-NOMA are superposition coding (SC) at the transmitter and successive interference cancellation (SIC) at the receiver [5]. SC is a technique that combines two or more types of data with power allocation, and SIC is a technique that decodes the stronger signal first and removes the decoded signal from the combined signal to decode the weaker signal. In a NOMA system with multiple users, users with better channel conditions perform more SIC to decode their signals [6].
Since NOMA, which has been studied so far, transmits data to multiple users in one cluster by dividing power resources, there is a problem that it is easily modified by noise power during the SIC process at the receiver [7]. Unlike OMA, in which multiple users’ data are sent by dividing the power resource, NOMA compresses multiple data into one resource, leading to enhanced data rates but potentially decreased error performance. In a system with two users, when combining the data of both users through SC, if the bits of the two data are the same, they would be indistinguishable from sending data of one user in an OMA system. The decrease in error performance arises from differences in the bits of the two data. Taking this into account, we have researched a direction to reduce the data length combined through SC while modifying the bits similar to OMA, aiming to improve bit error rate (BER) performance. In this paper, we propose a coding method that transforms the data of two users through exclusive OR (XOR) bitwise operations and adds redundancy data. The advantage of this approach is that it can improve the error performance of both users. Furthermore, since power allocation in SC does not apply to the original signal, this method leads to an enhancement in sum rate and better user fairness.
Notations: ( · ) OMA and ( · ) NOMA represent information in OMA and NOMA systems, respectively; · ˜ denotes information in the proposed design; ⊕ is the XOR bitwise operator; ( · ) I and ( · ) Q represent the in-phase and quadrature components, respectively; P ( · ) denotes the probability of an event; and P k ( e ) denotes the bit error probability of user k.

2. System Model

Although previous studies have typically been conducted on systems with many clusters containing numerous users, in this paper, we consider only one cluster with two users because it explains how a new encoding and decoding method is better than the existing methods. Figure 1 shows the NOMA wireless communication system in a downlink scenario with one base station (BS) and two users. Each node has a single antenna. The channels between the BS and the users experience independent and identically distributed Rayleigh fading. It is assumed that the channel state of user 1 is better than that of user 2, i.e., user 1 is considered as the cell-center user, and user 2 is the cell-edge user. The received signal of the users is as follows:
Y = P t H x + n ,
where P t denotes the BS transmit power, H C 2 × 1 denotes the channel between the BS and users, and n denotes additive white Gaussian noise (AWGN) with a zero mean and σ 2 variance. x is a signal sent from the BS, which is described later in Section 2.1, Section 2.2 and Section 3.1.

2.1. OMA System

In the OMA system, it is assumed that two users receive their data by allocating resources to each user in one resource block. When user k’s signal is defined as s k , the received signal at user i is as follows:
y k OMA = P t h k s k + n k , k = 1 , 2
where h k and n k are row vectors of H and n , respectively. h k represents the channel between the BS and user k, while n k represents the AWGN noise at user k. Additionally, the data rate for each user can be expressed as follows:
R k OMA = λ k OMA log 2 1 + ρ h k 2 , k = 1 , 2
where λ k denotes the ratio of user k’s information in one resource block, λ 1 OMA + λ 2 OMA = 1, and ρ denotes the transmit signal-to-noise ratio (SNR), ρ = P t / σ 2 .

2.2. Conventional NOMA System

In the conventional NOMA system, the signals of each user are combined at the BS through SC, and the combined signal is sent to users within a single resource block. The signal x sent from the BS can be expressed as follows:
x = α 1 s 1 + α 2 s 2 ,
where α k denotes the power allocation coefficient ( α 1 + α 2 = 1 and α 2 > α 1 , for k = 1 , 2 ). Since user 2 is far away from the BS, in general, more power is allocated to s 2 to achieve better fairness. According to (1) and (4), the received signal at user k for the conventional NOMA is represented as follows:
y k NOMA = α 1 P t h k s 1 + α 2 P t h k s 2 + n k .
Since user 2 decodes s 2 without SIC, the term corresponding to s 1 is considered as interference. Therefore, the data rate for s 2 at user 2 is given as follows:
R 2 NOMA = log 2 1 + α 2 h 2 2 α 1 h 2 2 + 1 ρ .
After performing SIC, the data rate of s 1 at user 1 is calculated as follows:
R 1 NOMA = log 2 1 + ρ α 1 h 1 2 .

3. Proposed Scheme

3.1. Proposed Transmitter Design

The characteristic of NOMA is a high transmission rate, but it is susceptible to noise because two or more users’ data are transmitted on one frequency or time resource block. To address this, our approach can reduce the impact of noise by not dividing the power of the user’s actual data and adding redundancy data to help decode the data. Redundancy data can be obtained by performing an XOR bit operation on the data of two users.
Figure 2 shows the block diagram of the proposed transmitter design. When b k denotes the bit stream of user k’s data, the XOR logic bit operation value of b 1 and b 2 is defined as b XOR :
b XOR = b 1 b 2 .
Next, the partial bits obtained by splitting b XOR into N are defined as b XOR , n , n 1 , 2 , , N . Then, the parts are combined using the SC technique. The redundancy data are as follows:
s c = n = 1 N α n s c , n ,
where α denotes the power allocation coefficient, n = 1 N α n = 1 , and s c , n denotes the modulated signal of b XOR , k . Finally, the transmitter transmits s 2 and s c serially to the receiver.
The reason for sending the signal s 2 instead of s 1 is to increase the system’s user fairness. If s 1 is sent, user 2 should obtain b XOR to decode b 2 . Since s c is a signal combined with SC, the required SNR to decode it is high. Therefore, assigning the task of converting s c to b XOR to user 1, who has a better channel condition, helps increase the overall system’s bit error probability.

3.2. Proposed Receiver Design

Figure 3 shows the block diagram of the proposed receiver design. User 2 can obtain s 2 by decoding the received signal, and b 2 is given by demodulating s 2 . In contrast, user 1 can obtain both s 2 and s c , 2 by decoding the received signal. Similar to user 2, user 1 can obtain b 2 by demodulating s 2 . User 1 can then perform SIC to remove s c , 2 from the received signal and obtain s c , 1 . s c , 1 and s c , 2 are demodulated to b XOR , 1 and b XOR , 2 , respectively, which are then serially combined to b XOR . Finally, user 1 can obtain b 1 , which is the XOR logical operation value of b 2 and b XOR ( b 2 b XOR ). Since user 1 and user 2 both carry information in s 2 , the data rate of user k in the proposed system is given as follows:
R ˜ k = λ ˜ k log 2 1 + ρ h k 2 .
As user 1 and user 2 share common information, the amount of information in a single resource block is the same for both. Furthermore, as N increases, the proportion of redundancy decreases. Therefore, λ ˜ is given as follows:
λ ˜ 1 = λ ˜ 2 = N 1 + N .

4. Performance Analysis

In this section, we analyze the exact BER expression for both the conventional NOMA and the proposed NOMA. In this paper, it is assumed that the data for user 1 and user 2 are modulated by QPSK. Each user’s symbol is detected as one of 00 , 01 , 10 , 11 , assuming that the priori probabilities of each symbol are equal, and each symbol is modulated according to QPSK as { 1 / 2 + j 1 / 2 , 1 / 2 + j 1 / 2 , 1 / 2 j 1 / 2 , 1 / 2 j 1 / 2 }.

4.1. Exact BER of Conventional NOMA

In the conventional NOMA system, both user 1 and user 2 decode the received signal to detect s 2 . Additionally, user 1 detects and removes s 2 to decode its own signal, s 1 . Therefore, the error probability for s 2 at user k is first calculated. In QPSK modulation, since each symbol consists of 2 bits, the probability that user k fails to decode s 2 can be expressed as the average of the error probabilities for the first and second bits of s 2 , as follows:
P ( X k ) = 1 2 P ( X 1 k ) + P ( X 2 k ) ,
where X j denotes the event that user k incorrectly detects s 2 and X j k denotes the event that user k incorrectly detects the j-th bit of s 2 ( j = 1 , 2 ) [8]. Figure 4 shows the constellation diagram of the signals received by each user in a conventional NOMA system. Each point represents the combination of signals s 1 and s 2 under SC. It is denoted as s 1 , s 2 , and the received signals at each point are expressed by (5) as ( ± α 1 P t / 2 ± j α 1 P t / 2 ) h k + ( ± α 2 P t / 2 ± j α 2 P t / 2 ) h k + n k .
In Figure 4, an error occurs if any point on the constellation diagram deviates from its appropriate decision region. It is evident that the first bit of the QPSK symbol is determined by the quadrature part, and the second bit is determined by the in-phase part. For instance, if the actual first bit of s 2 is 1, in order to detect the first bit correctly, points A k and B k should be located below the boundary of the decision region. The second bit can also be approached in the same way as before. That is, since user k mistakenly decides bit 1 as 0 when point A k or B k is greater than 0, P ( X 1 k ) and P ( X 2 k ) can be expressed as follows:
P ( X 1 k ) = 1 2 P X 1 , A k k + P X 1 , B k k P ( X 2 k ) = 1 2 P X 2 , A k k + P X 2 , B k k ,
where X j , i k denotes the event that user k incorrectly detects the j-th bit of s 2 due to the position of point i ( i = A k , B k ). By substituting (5) and the QPSK symbols, (13) can be expressed as follows:
P ( X 1 k ) = 1 2 P n Q ϵ 2 2 h k + ϵ 1 2 h k + P n Q ϵ 2 2 h k ϵ 1 2 h k , P ( X 2 k ) = 1 2 P n I ϵ 2 2 h k + ϵ 1 2 h k + P n I ϵ 2 2 h k ϵ 1 2 h k ,
where n I and n Q denote the in-phase and quadrature components of the noise, respectively, and ϵ k is the symbol energy, α k P t [9]. By substituting (14) into (12), the error probability of user 2 is defined as follows:
P 2 ( e ) = P ( X 2 ) = 1 2 Q ( ϵ 2 / 2 + ϵ 1 / 2 ) h 2 σ 2 / 2 + Q ( ϵ 2 / 2 ϵ 1 / 2 ) h 2 σ 2 / 2 ,
where Q(·) denotes the Gaussian Q function. The simplified expression of (15) is as follows:
P 2 ( e ) = 1 2 Q γ A 2 + Q γ B 2 ,
where γ i is the SNR for the i signal points given in Figure 4. For i = A k , B k , γ i can be expressed as follows:
γ A k = ( ϵ 2 + ϵ 1 ) 2 h k 2 σ 2 , γ B k = ( ϵ 2 ϵ 1 ) 2 h k 2 σ 2 .
Then, the average BER at user 2 can be obtained as follows:
P 2 ( e ) ¯ = 1 2 0 Q γ A 2 f γ A 2 γ A 2 d γ A 2 + 0 Q γ B 2 f γ B 2 γ B 2 d γ B 2 ,
where f γ i is the probability density function (PDF) of SNR. In this paper, assuming a Rayleigh fading channel, the PDF of the SNR is defined as follows:
f γ i γ = 1 γ i ¯ e γ / γ i ¯ , γ 0 ,
where γ i ¯ denotes the average of γ i .
Using ([10], Equations (13.3)–(7)) and (19), (18) is given as follows:
P 2 ( e ) ¯ = 1 4 2 γ A 2 ¯ 2 + γ A 2 ¯ γ B 2 ¯ 2 + γ B 2 ¯ .
Next, user 1 decodes s 1 after performing SIC to remove s 2 . The error probability of user 1 depends on whether s 2 is detected correctly or incorrectly. Therefore, the error probability of user 1 is defined as follows:
P 1 ( e ) = P 1 ( e | ( X 1 ) ) + P 1 ( e | X 1 ) ,
where ( · ) denotes the complement of ( · ) . Figure 5a shows the constellation of s 1 after user 1 correctly detects s 2 and performs SIC. The expressions for each signal are derived from the signal expressions in Figure 4 with the terms containing ϵ 2 removed. Therefore, the signal at each point is expressed as ( ± ϵ 1 / 2 ± j ϵ 1 / 2 ) h 1 + n 1 . For the correct detection of the bits in s 1 , the points C or C′ on the in-phase and quadrature axes should not fall outside their respective decision regions.
User 1 incorrectly detects the first bit of s 1 if either ϵ 1 / 2 h 1 + n Q 0 or ϵ 1 / 2 h 1 + n Q 0 , and incorrectly detects the second bit of s 1 if either ϵ 1 / 2 h 1 + n I 0 or ϵ 1 / 2 h 1 + n I 0 . Hence, the bit error probability of user 1, under the condition that no error occurs when detecting s 2 symbols, is given as follows:
P 1 ( e | ( X 1 ) ) = 1 2 1 4 P ( X 1 , A 1 1 ) × P n Q ϵ 1 2 h 1 ( X 1 , A 1 1 ) + P n I ϵ 1 2 h 1 ( X 1 , A 1 1 ) + 1 4 P ( X 1 , B 1 1 ) × P n Q ϵ 1 2 h 1 ( X 1 , B 1 1 ) + P n I ϵ 1 2 h 1 ( X 1 , B 1 1 ) + 1 4 P ( X 2 , A 1 1 ) × P n Q ϵ 1 2 h 1 ( X 2 , A 1 1 ) + P n I ϵ 1 2 h 1 ( X 2 , A 1 1 ) + 1 4 P ( X 2 , B 1 1 ) × P n Q ϵ 1 2 h 1 ( X 2 , B 1 1 ) + P n I ϵ 1 2 h 1 ( X 2 , B 1 1 ) ,
where 1 4 P ( ( X j , A 1 1 ) ) and 1 4 P ( ( X j , B 1 1 ) ) are the probabilities that user 1 correctly detects the j-th bit of s 2 as given in (13). If the fundamental theorem of conditional probability, P ( A | B ) = P ( A B ) / P ( B ) , is applied, (22) can be redefined as follows:
P 1 ( e | ( X 1 ) ) = 1 8 P ϵ 1 2 h 1 n Q ϵ 2 2 h 1 + ϵ 1 2 h 1 + P n Q ϵ 1 2 h 1 + P n I ϵ 1 2 h 1 × P n Q ϵ 2 2 h 1 + ϵ 1 2 h 1 + P n Q ϵ 2 2 h 1 ϵ 1 2 h 1 + P ϵ 1 2 h 1 n I ϵ 2 2 h 1 + ϵ 1 2 h 1 + P n I ϵ 1 2 h 1 + P n Q ϵ 1 2 h 1 × P n I ϵ 2 2 h 1 + ϵ 1 2 h 1 + P n I ϵ 2 2 h 1 ϵ 1 2 h 1 .
For the purpose of simplifying (23), we define the SNR for the C or C′ signal point given in Figure 5a as follows:
γ C = ϵ 1 h 1 2 σ 2 .
Then, the error probability of s 1 , given that user 1 correctly detects s 2 , is expressed as follows:
P 1 ( e | ( X 1 ) ) = 1 4 Q γ C × 4 Q γ A 1 Q γ B 1 Q γ A 1 .
Figure 5b,c show the constellations of s 1 after user 1 incorrectly detects s 2 and performs SIC. These represent the cases where the first bit of s 2 is in error and where the second bit is in error, respectively. The expressions at points D and E, contrary to the case of X 1 , represent the in-phase and quadrature components of the signal, respectively, where terms containing ϵ 1 or ϵ 2 are not removed, but instead added to the signals in Figure 4: ( ± ϵ 1 / 2 2 ϵ 1 / 2 ) h 1 + n 1 . In Figure 5b, user 1 incorrectly detects the first bit of s 1 if either ( ϵ 1 / 2 2 ϵ 2 / 2 ) h 1 + n Q 0 or ( ϵ 1 / 2 2 ϵ 2 / 2 ) + n Q 0 , and incorrectly detects the second bit of s 1 if either ϵ 1 / 2 h 1 + n I 0 or ϵ 1 / 2 h 1 + n I 0 . Similarly, in Figure 5c, user 1 incorrectly detects the first bit of s 1 if either ϵ 1 / 2 h 1 + n Q 0 or ϵ 1 / 2 h 1 + n Q 0 , and incorrectly detects the second bit of s 1 if either ( ϵ 1 / 2 2 ϵ 2 / 2 ) h 1 + n I 0 or ( ϵ 1 / 2 2 ϵ 2 / 2 ) + n I 0 . Hence, the bit error probability of user 1, under the condition that error occurs when detecting s 2 symbols, is given as follows:
P 1 ( e | X 1 ) = 1 2 1 4 P X 1 , A 1 1 × P n Q 2 ϵ 2 2 h 1 + ϵ 1 2 h 1 X 1 , A 1 1 + P n I ϵ 1 2 h 1 X 1 , A 1 1 + 1 4 P X 1 , B 1 1 × P n Q 2 ϵ 2 2 h 1 ϵ 1 2 h 1 X 1 , B 1 1 + P n I ϵ 1 2 h 1 X 1 , B 1 1 + 1 4 P X 2 , A 1 1 × P n Q ϵ 1 2 h 1 X 2 , A 1 1 + P n I 2 ϵ 2 2 h 1 + ϵ 1 2 h 1 X 2 , A 1 1 + 1 4 P X 2 , B 1 1 × P n Q ϵ 1 2 h 1 X 2 , B 1 1 + P n I 2 ϵ 2 2 h 1 ϵ 1 2 h 1 X 2 , B 1 1 ,
where 1 4 P ( X j , A 1 1 ) and 1 4 P ( X j , B 1 1 ) are the probabilities that user 1 incorrectly detects the j-th bit of s 2 as given in (13). Similar to (23), (26) can be redefined as follows:
P 1 ( e | X 1 ) = 1 8 P ϵ 2 2 h 1 ϵ 1 2 h 1 n Q 2 ϵ 2 2 h 1 ϵ 1 2 h 1 + P n Q 2 ϵ 2 2 h 1 + ϵ 1 2 h 1 + P n I ϵ 1 2 h 1 × P n Q ϵ 2 2 h 1 + ϵ 1 2 h 1 + P n Q ϵ 2 2 h 1 ϵ 1 2 h 1 + P ϵ 2 2 h 1 ϵ 1 2 h 1 n I 2 ϵ 2 2 h 1 ϵ 1 2 h 1 + P n I 2 ϵ 2 2 h 1 + ϵ 1 2 h 1 + P n Q ϵ 1 2 h 1 × P n I ϵ 2 2 h 1 + ϵ 1 2 h 1 + P n I ϵ 2 2 h 1 ϵ 1 2 h 1
For the purpose of simplifying (27), we define the SNR for the D and E signal point given in Figure 5b,c as follows:
γ D = ( 2 ϵ 2 + ϵ 1 ) 2 h 1 2 σ 2 , γ E = ( 2 ϵ 2 ϵ 1 ) 2 h 1 2 σ 2 .
Then, the error probability of s 1 , given that user 1 incorrectly detects s 2 , is expressed as follows:
P 1 ( e | X 1 ) = 1 4 Q γ C × Q γ A 1 + Q γ B 1 + Q γ B 1 + Q γ D Q γ E .
By substituting (25) and (29) into (21), the error probability of user 1 is obtained as follows:
P 1 ( e ) = Q γ C + 1 4 Q γ A 1 + Q γ B 1 + Q γ D Q γ E .
Then, the average BER at user 1 can be obtained as follows:
P 1 ( e ) ¯ = 0 Q γ C f γ C γ C d γ C + 1 4 0 Q γ A 1 f γ A 1 γ A 1 d γ A 1 + 0 Q γ B 1 f γ B 1 γ B 1 d γ B 1 + 0 Q γ D f γ D γ D d γ D 0 Q γ E f γ E γ E d γ E .
Using ([10], Equations (13.3)–(7)) and (19), (31) is given as follows:
P 1 ( e ) ¯ = 1 2 1 γ C ¯ 2 + γ C ¯ + 1 8 γ A 1 ¯ 2 + γ A 1 ¯ γ B 1 ¯ 2 + γ B 1 ¯ + γ D ¯ 2 + γ D ¯ γ E ¯ 2 + γ E ¯ .

4.2. Exact BER of Proposed Transmitter and Receiver

In the proposed method, the transmitter sends two types of data: one is the information for user 2, and the other are the redundancy data used to transform the former data into the information for user 1. In this method, user 2 only requires the former data, while user 1 requires both the former and the latter data. Therefore, we proceed by separating the former and latter data to calculate the error probability. In this section, we assume N = 2 . First, the constellation diagram of the former data is represented as shown in Figure 6.
The received signals at each point are expressed as ( ± P t / 2 ± j P t / 2 ) h k + n k . User k incorrectly detects the first bit of s 2 if P t / 2 h k + n Q 0 , and incorrectly detects the second bit of s 2 if P t / 2 h k + n I 0 . Thus, the error probability for s 2 at user k is expressed as follows:
P ˜ ( X k ) = 1 2 P n Q P t 2 h k + P n I P t 2 h k .
To simplify (33), SNR at points F k can be expressed as follows:
γ F k = P t h k 2 σ 2 .
By substituting (34) into (33), the error probability of user 2 is defined as follows:
P ˜ 2 ( e ) = P ˜ ( X 2 ) = Q γ F 2 .
Then, the average BER at user 2 for the proposed receiver can be obtained as follows:
P ˜ 2 ( e ) ¯ = 0 Q γ F 2 f γ F 2 γ F 2 d γ F 2 .
Using ([10], Equations (13.3)–(7)) and (19), (36) is given as follows:
P ˜ 2 ( e ) ¯ = 1 2 1 γ F 2 ¯ 2 + γ F 2 ¯ .
Next, for user 1, the error probabilities of both s 2 and s c should be considered. The error probability of s 2 is the probability of incorrectly detecting b 2 , and the error probability of s c is the probability of incorrectly detecting b XOR . Examining the error probability of user 1, the XOR bit operation results in 1 when the two bits are different, and 0 when they are the same. Due to this characteristic, if both b 2 and b XOR are incorrectly detected, the final b 1 obtained in Section 3.2 would be detected without error. Therefore, the error for user 1 occurs only when either s 2 or s c has an error. The average error probability of user 1 in the proposed receiver is expressed as follows:
P ˜ 1 ( e ) ¯ = 1 P ˜ ( X 1 ) ¯ P ˜ ( Y 1 ) ¯ + 1 P ˜ ( Y 1 ) ¯ P ˜ ( X 1 ) ¯ ,
where Y 1 denotes the event that user 1 incorrectly detects s c . Due to (33) and (34), the error probability of s 2 for user 1 is given as follows:
P ˜ ( X 1 ) = Q γ F 1 .
Then, the average error probability of s 2 at user 1 is given as follows:
P ˜ ( X 1 ) ¯ = 0 Q γ F 1 f γ F 1 γ F 1 d γ F 1 = 1 2 1 γ F 1 ¯ 2 + γ F 1 ¯ .
Since s c is a combination of s c , 1 and s c , 2 combined in series, its average error probability for user 1 can be represented as the average value of the error probabilities for the s 1 and s 2 of user 1 in conventional NOMA, as follows:
P ˜ ( Y 1 ) ¯ = 1 2 P 1 ( e ) ¯ + P X 1 ¯ .
By substituting (12) and (32), (41) is obtained as follows:
P ˜ ( Y 1 ) ¯ = 1 4 2 γ C ¯ 2 + γ C ¯ + 1 16 γ A 1 ¯ 2 + γ A 1 ¯ 3 γ B 1 ¯ 2 + γ B 1 ¯ + γ D ¯ 2 + γ D ¯ γ E ¯ 2 + γ E ¯ .
By substituting (40) and (42) into (38), the average error probability of user 2 is given as follows:
P ˜ 1 ( e ) ¯ = 1 2 1 γ F 1 ¯ 2 + γ F 1 ¯ + γ F 1 ¯ 2 + γ F 1 ¯ × 1 4 2 γ C ¯ 2 + γ C ¯ + 1 16 γ A 1 ¯ 2 + γ A 1 ¯ 3 γ B 1 ¯ 2 + γ B 1 ¯ + γ D ¯ 2 + γ D ¯ γ E ¯ 2 + γ E ¯ .

5. Numerical Results

In this section, we present a performance comparison of simulation results for the proposed scheme (Table 1). The channel experiences a distance-dependent attenuation of large-scale fading, and the pathloss factor is expressed as L k ( d ) = L 0 ( d k / d 0 ) β , where L 0 represents the pathloss at the reference distance d 0 = 1(m), d k is the distance between the BS and user k, and β is the pathloss exponent.
Figure 7 shows the sum rate performance versus transmit power. The data rate of user 1 is reduced due to redundancy data. On the other hand, the data rate of user 2 is further improved because the signal is sent without power allocation. Therefore, the overall sum rate of users in the proposed scheme shows greater improvement than that of the other schemes. At a transmission power of 15 dBm, there is approximately 15% improvement in sum rate performance, and at 30 dBm, there is about 20% improvement. Figure 8 shows the BER performance versus transmit power, comparing the proposed scheme with other conventional schemes. In the proposed scheme, it can be seen that the BER performance is better than in the conventional NOMA because users experience no power loss in their original information. Significantly, the proposed scheme reduces the required transmit power by 5 dB compared to existing methods to achieve a BER performance of 10−3. The BER for user 2 with poor channel conditions has the same performance as OMA, but the BER for user 1 with good channel conditions is reduced compared to OMA due to errors that occur in demodulating the redundancy data. If user 1 achieves a sufficient SNR to decode the redundancy data without errors, the BER performance of the proposed scheme becomes similar to that of OMA. Figure 9 shows the BER performance of user 1 and user 2 in the proposed scheme. The analytical results show the calculations using (43) for user 1 and (37) for user 2 for the exact and approximate results. In the proposed design, the BER performance of user 1 and user 2 using the same modulation scheme demonstrates that the overall system maintains user fairness compared to the conventional NOMA.

6. Conclusions

In this paper, we propose a scheme that adds XOR bit operations into the transmitter and receiver designs of conventional NOMA to alleviate performance degradation caused by the power distribution of the original signal. The addition of the XOR bit operation can improve the overall sum rate of users while mitigating the error performance degradation caused by power allocation. Additionally, by improving the BER and data rate of users with poor channel conditions, the user fairness of the entire system can be improved. Therefore, in systems where the required SNR is high for users with poor channel conditions, high communication performance can be expected by applying the proposed scheme. In this paper, as we have demonstrated through simulations that the addition of this XOR operation reduced the required power by 5 dB, the proposed transceiver model can be expected to achieve higher energy efficiency and increased network capacity.

Author Contributions

Conceptualization, S.-W.P. and H.-D.K.; methodology, S.-W.P. and K.-H.S.; software, S.-W.P. and J.-W.K.; validation, S.-W.P. and H.-K.S.; formal analysis, S.-W.P.; investigation, S.-W.P. and S.-H.S.; resources, S.-W.P. and Y.-J.C.; data curation, S.-W.P.; writing—original draft preparation, S.-W.P.; writing—review and editing, S.-W.P. and H.-K.S.; visualization, S.-W.P.; supervision, Y.-H.Y. and H.-K.S.; project administration, Y.-K.M. and H.-K.S.; funding acquisition, Y.-H.Y. and H.-K.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Institute of Information and Communications Technology Planning and Evaluation (IITP) grant funded by the Korean government [Ministry of Science and ICT (MSIT)], South Korea, under the Metaverse Support Program to Nurture the Best Talents under Grant IITP-2024-RS-2023-00254529; in part by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education under Grant 2020R1A6A1A03038540; and in part by the National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIT) (No. RS-2023-00219051).

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

References

  1. Saito, Y.; Kishiyama, Y.; Benjebbour, A.; Nakamura, T.; Li, A.; Higuchi, K. Non-Orthogonal Multiple Access (NOMA) for Cellular Future Radio Access. In Proceedings of the 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), Dresden, Germany, 2–5 June 2013; pp. 1–5. [Google Scholar]
  2. Ding, Z.; Yang, Z.; Fan, P.; Poor, H.V. On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users. IEEE Signal Process. Lett. 2014, 21, 1501–1505. [Google Scholar] [CrossRef]
  3. Kim, J.; Koh, J.; Kang, J.; Lee, K.; Kang, J. Design of user clustering and precoding for downlink non-orthogonal multiple 114 access (NOMA). In Proceedings of the MILCOM 2015—2015 IEEE Military Communications Conference, Tampa, FL, USA, 26–28 October 2015; pp. 1170–1175. [Google Scholar]
  4. Makki, B.; Chitti, K.; Behravan, A.; Alouini, M.S. A Survey of NOMA: Current Status and Open Research Challenges. IEEE Open J. Commun. Soc. 2020, 1, 179–189. [Google Scholar] [CrossRef]
  5. Dai, L.; Wang, B.; Yuan, Y.; Han, S.; Chih-lin, I.; Wang, Z. Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends. IEEE Commun. Mag. 2015, 53, 74–81. [Google Scholar] [CrossRef]
  6. Islam, S.R.; Avazov, N.; Dobre, O.A.; Kwak, K.S. Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges. IEEE Commun. Surv. Tutorials 2017, 19, 721–742. [Google Scholar] [CrossRef]
  7. Vaezi, M.; Schober, R.; Ding, Z.; Poor, H.V. Non-Orthogonal Multiple Access: Common Myths and Critical Questions. IEEE Wirel. Commun. 2019, 26, 174–180. [Google Scholar] [CrossRef]
  8. Al-Dweik, A.; Bedoui, A.; Iraqi, Y. On the BER Analysis of NOMA Systems. IEEE Wirel. Commun. Lett. 2024, 13, 786–790. [Google Scholar] [CrossRef]
  9. Kara, F.; Kaya, H. BER performances of downlink and uplink NOMA in the presence of SIC errors over fading channels. IET Commun. 2018, 12, 1834–1844. [Google Scholar] [CrossRef]
  10. Proakis, J.G.; Salehi, M. Digital Communications; McGraw-Hill: New York, NY, USA, 2001; Volume 4. [Google Scholar]
Figure 1. Illustration of downlink non-orthogonal multiple access with two users.
Figure 1. Illustration of downlink non-orthogonal multiple access with two users.
Mathematics 12 02752 g001
Figure 2. Functional block diagram of the proposed transmitter.
Figure 2. Functional block diagram of the proposed transmitter.
Mathematics 12 02752 g002
Figure 3. Functional block diagram of the proposed receivers for two users.
Figure 3. Functional block diagram of the proposed receivers for two users.
Mathematics 12 02752 g003
Figure 4. Constellation of signals received by user k for conventional NOMA.
Figure 4. Constellation of signals received by user k for conventional NOMA.
Mathematics 12 02752 g004
Figure 5. Constellations of s 1 signals after performing SIC for conventional NOMA: (a) when user 1 correctly detects s 2 , (b) when user 1 incorrectly detects the first bit of s 2 , and (c) when user 1 incorrectly detects the second bit of s 2 .
Figure 5. Constellations of s 1 signals after performing SIC for conventional NOMA: (a) when user 1 correctly detects s 2 , (b) when user 1 incorrectly detects the first bit of s 2 , and (c) when user 1 incorrectly detects the second bit of s 2 .
Mathematics 12 02752 g005
Figure 6. Constellation of s 2 signals received by user k for proposed receiver design.
Figure 6. Constellation of s 2 signals received by user k for proposed receiver design.
Mathematics 12 02752 g006
Figure 7. Sum rate performance comparison.
Figure 7. Sum rate performance comparison.
Mathematics 12 02752 g007
Figure 8. BER performance comparison.
Figure 8. BER performance comparison.
Mathematics 12 02752 g008
Figure 9. BER performance comparison of user 1 and user 2 in proposed scheme.
Figure 9. BER performance comparison of user 1 and user 2 in proposed scheme.
Mathematics 12 02752 g009
Table 1. Simulation settings.
Table 1. Simulation settings.
ParametersValue
d 1 100 [m]
d 1 200 [m]
β 3
Noise Power−80 [dBm]
α 1 1/5
N2
λ 1 O M A , λ 2 O M A 1/2
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Park, S.-W.; Kim, H.-D.; Shin, K.-H.; Kim, J.-W.; Seo, S.-H.; Choi, Y.-J.; You, Y.-H.; Moon, Y.-K.; Song, H.-K. Performance Analysis of a New Non-Orthogonal Multiple Access Design for Mitigating Information Loss. Mathematics 2024, 12, 2752. https://doi.org/10.3390/math12172752

AMA Style

Park S-W, Kim H-D, Shin K-H, Kim J-W, Seo S-H, Choi Y-J, You Y-H, Moon Y-K, Song H-K. Performance Analysis of a New Non-Orthogonal Multiple Access Design for Mitigating Information Loss. Mathematics. 2024; 12(17):2752. https://doi.org/10.3390/math12172752

Chicago/Turabian Style

Park, Sang-Wook, Hyoung-Do Kim, Kyung-Ho Shin, Jin-Woo Kim, Seung-Hwan Seo, Yoon-Ju Choi, Young-Hwan You, Yeon-Kug Moon, and Hyoung-Kyu Song. 2024. "Performance Analysis of a New Non-Orthogonal Multiple Access Design for Mitigating Information Loss" Mathematics 12, no. 17: 2752. https://doi.org/10.3390/math12172752

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop