Professional Documents
Culture Documents
https://doi.org/10.1007/s11235-023-01014-4
Abstract
Resource sharing and management can significantly improve the performance and spectral efficiency of wireless systems.
In power domain non-orthogonal multiple access (NOMA) systems, users share a common bandwidth for simultaneous
data transmission and therfore, the spectral efficiency of the system will be improved at the expense of increased complexity.
Provided proper power allocation, it is possible to detect symbols at receivers. In this paper, the downlink of a cellular system is
considered where a base station (BS) communicates with two users using NOMA with the assistance of a decode-and-forward
(DF) relay. In the proposed scheme, receivers combine received signals from direct and cooperative links, and decode symbols
by employing successive interference cancellation (SIC). The bit error rate (BER) performance of the proposed scheme is
analyzed and the optimal power allocation is also derived through a Min–Max optimization, and a closed form approximate
solution is proposed for binary phase shift keying (BPSK) modulation. Furthermore, it is proved that the proposed receiver
achieves full diversity order for all users for proper choice of power allocation. Simulation results also corroborate BER and
diversity analysis.
Keywords Decode and forward (DF) relay · Non-orthogonal multiple access · Power allocation · Successive interference
cancellation
123
228 A. Olfat
ter for data transmission. Two protocols that are widely used
in relaying systems, include amplify and forward (AF) and
decode and forward (DF) relaying [16]. In AF method, relay
retransmits the received signal, while in DF relaying relay
decodes the received symbols, and then retransmits them
[17]. System performance depends on the number of relays
and system structure, but it is generally proved that coop-
erative communication increases capacity and throughput.
Using relays in NOMA systems, can improve the spec- Fig. 1 Block diagram of a cooperative network with two users
tral efficiency and bit error rate (BER) performance of
communication systems simultaneously [18]. In [18], a coop-
erative non-orthogonal multiple access (NOMA) system is the diversity order of proposed scheme is analyzed and it
proposed, where one near user is employed as decode-and- is shown the the proposed method achieves full diversity
forward (DF) relaying switching between full-duplex (FD) order for both users if the proper power allocation condi-
and half-duplex (HD) mode to help a far user. Performance tion for users are met. Performance of proposed scheme
metrics are outage probability, ergodic rate and energy effi- is investigated through simulations which corroborates the
ciency. In [19] the source transmits two symbols using the analytical results. The main contribution of this paper is the
superposition code, and the relay decodes and retransmits the investigation of BER metric and diversity order for NOMA
symbol of the user with lower allocated power by employing based cooperative systems while other related works consider
the successive interference cancellation (SIC). At the des- metrics like energy efficiency, ergodic capacity and outage
tination, two symbols from both the direct signal and the probability. Furthermore this paper investigates the diversity
forwarded signal are decoded by using the maximum-ratio order of proposed method and derives sufficient conditions
combining and the ergodic sum rate and the outage perfor- under which full diversity order can be achieved.
mance of the system are investigated. The rest of this paper is organized as follows. In Sect. 2, the
A model of a cooperative network with K users is con- model of system under investigation is described. In Sect. 3,
sidered in [20]. There is no dedicated relay, and users assist the proposed receiver is introduced, and its BER performance
each other for data transmission. Based on SIC technique, for BPSK modulation is analyzed in Sect. 4. Power alloca-
each user should decode symbol of users with more power; tion problem is formulated in Sect. 5. In Sect. 6, diversity
hence, it can act as a relay and send its estimation to stronger order of the proposed receiver is evaluated. In Sect. 7 results
users. The outage probability and ergodic sum rate of this are extended to any arbitrary constellation. Simulation and
model is calculated based on SINR of each user. The main numerical results are presented in Sect. 8. Finally, conclu-
drawback of this model is that (K −1) time slots are required sions are drawn in Sect. 9.
to send one symbol. As a consequence, the delay of the sys-
tem will be increased by the number of users. One of the main
benefits of cooperative networks is improving coverage [15].
Power allocation and user pairing have a significant effect 2 System model
on the performance of NOMA based networks. In [21], an
algorithm is suggested for maximizing power efficiency, by In this paper, downlink of a NOMA based network with two
assuming perfect channel state information (CSI). In [22, users is considered where a relay assists the BS for data trans-
23], the impact of user paring on NOMA based networks are mission. With reference to Fig. 1, our model consists of a
investigated and it is shown that the best performance corre- source (S) and a DF relay (R) and two destinations (D1 , D2 ).
sponds to a scenario in which users with distinctive channel By employing superposition coding at the BS, symbol of
conditions are paired. users are combined with specific scales α and β to be trans-
In this paper, the BER performance of a cooperative mitted. By considering time division duplex (TDD) mode,
NOMA system is investgated. A base station communicates data transmission consists of two time slots. In the first time
with two users by NOMA with the assistance of a DF relay. slot, S broadcast coded signal (αS1 + β S2 ) to relay and both
After combining the received signals from the direct and destinations. Received symbols at R, D1 and D2 can be writ-
cooperative paths, users decode their symbols using SIC tech- ten as,
nique. The BER performance of proposed combining scheme
is computed in closed form for BPSK modulation and can be
y S R = h S R (αS1 + β S2 ) + n S R (1)
genelalized to arbitrary M-ary constellations. Further, a Min–
Max optimization is proposed for finding the optimum power y S D1 = h S D1 (αS1 + β S2 ) + n S D1 (2)
allocation, and an approximate solution is derived. Besides, y S D2 = h S D2 (αS1 + β S2 ) + n S D2 (3)
123
Resource allocation and BER performance analysis... 229
123
230 A. Olfat
The weak user first decodes symbol of strong user by the calculated as,
decision rule,
⎛ ⎞
√
Ps |h S R | pW eak ⎠
Ŝ1,2 =argmin{|y D2 −(w S D2 h S D2 +w R D2 h R D2 )αS1 |2 } (14) PeW eak = (1 − Pe Str ong )Q ⎝
S1 ∈A M N0
2
⎛ ⎞
√
of (14), the weak user decodes Sˆ2 as, Ps |h S R |( pW eak − 2 p Str ong )
then using Ŝ1,2 +Pe Str ong 0.5 Q ⎝ ⎠
N0
2
Sˆ2 = argmin{|y D2 − (w S D2 h S D2 + w R D2 h R D2 ) ⎛ ⎞
√
S2 ∈A M Ps |h S R |( pW eak + 2 p Str ong )
(15) +0.5 Q ⎝ ⎠
× (α Ŝ1,2 + β S2 )|2 } N0
2
(17)
⎧
⎪
⎪ (w h + w R D1 h R D1 )αS1 + (w S D1 h S D1 + w R D1 h R D1 )β S2 + N1 if Ŝ1 = S1 , Ŝ2 = S2
⎪ S D1 S D1
⎨
(w S D1 h S D1 + w R D1 h R D1 )αS1 + (w S D1 h S D1 − w R D1 h R D1 )β S2 + N1 if Ŝ1 = S1 , Ŝ2 = −S2
y D1 = (19)
⎪
⎪ (w S D1 h S D1 − w R D1 h R D1 )αS1 + (w S D1 h S D1 + w R D1 h R D1 )β S2 + N1 if Ŝ1 = −S1 , Ŝ2 = S2
⎪
⎩ (w h
S D1 S D1 − w R D1 h R D1 )αS1 + (w S D1 h S D1 − w R D1 h R D1 )β S2 + N1 if Ŝ1 = −S1 , Ŝ2 = −S2
⎡ ⎞⎤ ⎛
min{α, β}, the error probability of the strong user at relay can |H |α − |H |β
Pe1 = (1 − B)(1 − A) ⎣0.5Q ⎝
1 1 ⎠⎦
be expressed as,
2 σ N1
2
⎛ ⎞ ⎡ ⎛ ⎞⎤
√
Ps |h S R |( p Str ong − pW eak ) |H |α + |H |β
+ ⎣0.5Q ⎝ ⎠⎦
1 1
Pe Str ong = 0.5 Q ⎝ ⎠
N0 σ N1 2
2
⎛
2
⎞ ⎡ ⎛ ⎞⎤
√
Ps |h S R |( p Str ong + pW eak ) |H |α − |H |β
+B(1 − A) ⎣0.5Q ⎝
1 2 ⎠⎦
+0.5 Q ⎝ ⎠ (16)
N0
2 σ N1
2
⎡ ⎛ ⎞⎤2
|H1 |α + |H2 |β ⎠⎦
The weak user should subtract α Sˆ1 h S R from the received + ⎣0.5Q ⎝
σ N1 2
signal. If S1 is detected correctly, the interference will be 2
⎡ ⎛ ⎞⎤
eliminated after subtraction, whereas in BPSK modulation
|H |α − |H |β
+(1 − C)A ⎣0.5Q ⎝ ⎠⎦
2 1
the interference will be doubled in case of erroneous detec-
σ N1 2
tion. Thus, the error probability of the weak user can be 2
123
Resource allocation and BER performance analysis... 231
⎡ ⎛ ⎞⎤ ⎛ ⎞
|H |α + |H |β |G |α + |G |β
+ ⎣0.5Q ⎝ ⎠⎦ +0.5Q ⎝ ⎠
2 1 1 1
σ N1 2 σ N2 2
2 2
⎡ ⎛ ⎞⎤ ⎛ ⎞
|H |α − |H |β |G |α − |G |β
+C A ⎣0.5Q ⎝
2 ⎠⎦
= 0.5Q ⎝
2 1 2 ⎠
Pe22
σ N1 2 σ N2 2
2 2
⎡ ⎛ ⎞ ⎤ ⎛ ⎞
|H |α + |H |β |G |α + |G |β
+ ⎣0.5Q ⎝ ⎠ x⎦ +0.5Q ⎝ ⎠
2 2 1 2
(20)
σ N1 2 σ N2 2
2 2
⎛ ⎞
Using (19), the error probability of the strong user can be |G |α − |G |β
= 0.5Q ⎝
2 1 ⎠
Pe23
computed as (20), where H1 , H2 and σ N2 1 are defined as σ N2 2
2
⎛ ⎞
H1 = Ps (w R D1 h R D1 + w S D1 h S D1 ) |G 2 |α + |G 1 |β ⎠
+0.5Q ⎝
H2 = Ps (−w R D1 h R D1 + w S D1 h S D1 ) (21) σ N2 2
⎛ 2
⎞
σ N2 1 = |w R D1 |2 + |w S D1 |2 N0
|G |α − |G |β
= 0.5Q ⎝ ⎠
2 2
Pe24
In this equation A (probability of wrong detection of strong σ N2 2
user at relay), B (probability of wrong detection of weak user 2
conditioned on correct detection of strong user at relay) and ⎛ ⎞
C (probability of wrong detection of weak user conditioned |G 2 |α + |G 2 |β ⎠
on wrong detection of strong user at relay)are defined as +0.5Q ⎝ (24)
σ N2 2
follows: 2
⎛ ⎞ ⎛ ⎞
|h |(α − β) |h |(α + β)
A = 0.5 Q ⎝ ⎠ + 0.5 Q ⎝ ⎠
S R S R
σS R 2 σS R 2
where G 1 , G 2 and σ N2 2 are defined as,
2 2
⎛ ⎞
|h S R |β ⎠
B = Q⎝ G1 = Ps (w R D2 h R D2 + w S D2 h S D2 )
σS R 2
2
⎡ ⎛ ⎞ ⎛ ⎞⎤ G 2 = Ps (−w R D2 h R D2 + w S D2 h S D2 )
(β − 2 α)|h | (β + 2 α)|h |
C = ⎣0.5 Q ⎝
S R ⎠ + 0.5 Q ⎝
S R ⎠⎦ σ N2 2 = |w R D2 |2 + |w S D2 |2 N0 (25)
σS R 2 σS R 2
2 2
(22)
4.3 Error probability of weak user In NOMA, users will be separated by power and as a conse-
quence, the system performance strongly depends on power
From (3), (5) and (8), the combiner output for the weak user allocation adjustment. Generally, more power should be allo-
(user 2) can be written as cated to the user with weaker channel condition, but for
finding the optimum power allocation an optimization prob-
y D2 = w S D2 h S D2 (αS1 + β S2 ) + n S D2 lem should be defined. Different type of objectives can be
(23) considered for the optimization problem such as outage
+w R D2 h R D2 (α Ŝ1 + β Ŝ2 ) + n R D2
probability and ergodic sum rate. The goal of this paper is
proposing a receiver with acceptable BER performance for
Similarly, four scenarios are possible regarding the detection
both users. In this regard, we define an optimization problem
at relay. Considering (14) and (15), the error probability of
in order to minimize the maximum error probability of users
the weak user can be derived as (31) where Pe21 , Pe22 , Pe23
subject to the condition α 2 + β 2 = 1.
and Pe24 are the error probability of decoding symbols of the
The optimization problem can be presented as,
strong user by weak user in each scenario and are defined as
⎛ ⎞
|G |α − |G |β min max (Pe1 , Pe2 )
Pe21 = 0.5Q ⎝ ⎠
1 1
s.t α2 + β 2 = 1 . (26)
σ N2 2
2 0 < α, β < 1
123
232 A. Olfat
where Pe1 and Pe2 are defined as (20) and (31). Since the mal power allocation.
optimization problem is not convex, One possible approach
for solving this problem is using an exhaustive search which |G 1 |β
may have high computational complexity. Another approach Pe2 = (1 − B)(1 − A) (1 − Pe21 )Q 2
σ N2
is finding an approximate solution for (26). We should note 2
that the solution of (26) is the one of the points where Pe1 = |G 1 |β − 2|G 1 |α
+ Pe21 [0.5Q
Pe2 . σ N2 2
If we only consider the dominant terms forPe1 and Pe2 , ! 2
the approximate equation can be written as, |G 1 |β + 2|G 1 |α
+ 0.5Q ]
σ N2
2
⎛ ⎞ ⎛ ⎞ 2
|H1 |α − |H1 |β ⎠ |G 1 β| |G 2 |β
Q⎝ x = Q ⎝ 2 ⎠ (27) + B(1 − A) (1 − Pe22 )Q 2
σ N2
σ N1
2 σ N2
2
2 2
|G 2 |β − 2|G 1 |α
+ Pe22 [0.5Q
σ N2 2
The summation can be bounded by using the inequality 2
!
below, |G 2 |β + 2|G 1 |α
+ 0.5Q ]
σ N2
2
√ √ 2
Q( x) + Q( y) < Q min(x, y) |G 1 |β−|G 2 −G 1 |α
+(1 − C)A (1−Pe23 ) 0.5 Q
σ N2 2
2
!
Thus, |G 1 |β + |G 2 − G 1 |α
+ 0.5 Q
σ N2 2
⎛ ⎞ ⎛ ⎞ 2
|H |α − |H |β |G β| |G 1 |β − |G 2 + G 1 |α
Q⎝
1
1 ⎠
= Q ⎝ 2 ⎠
1
(28) + Pe23 [0.5Q
σ N1
2 σ N2 σ N2 2
2
2 2 !
|G 1 |β + |G 2 + G 1 |α
+ 0.5Q ]
σ N2
2
By substituting H1 with G 1 , we have 2
|G 2 |β − |G 2 − G 1 |α
+ C A (1 − Pe24 ) 0.5 Q
σ N2 2
(α − β)2 γmin 1 2
Q( |h S D1 | +
2 |h R D1 | )
2 !
N0 /2 γ R D1 |G 2 |β + |G 2 − G 1 |α
+ 0.5 Q
2 σ N2
β2 γ min 2
=Q (|h 2 | + 2
|h R D2 |2 ) (29)
N0 /2 S D2 γ R D2 |G 2 |β − |G 2 + G 1 |α
+ Pe24 [0.5Q
2 σ N2
2
!
By solving this equation, a closed form solution for opti- |G 2 |β + |G 2 + G 1 |α
+ 0.5Q ]
mum power allocation problem can be calculated for BPSK 2 σ N2
modulation as 2
(31)
η 1
α= , β=
1+η 1+η 6 Diversity analysis of DF relaying
(30)
γ̄ S D2 + min{γ̄ S R , γ̄ R D2 }
η≈( + 1)2 Diversity order is defined as the negative exponent of the
γ̄ S D1 + min{γ̄ S R , γ̄ R D1 }
average BER when SNR tends to infinity. As a matter of
fact,
In the simulation section, we will show that the proposed
approximation has a good performance very close to the opti- Pγ̄b→∞ ≈ (G c γ̄ )−G d (32)
123
Resource allocation and BER performance analysis... 233
the diversity order is G d , and G c denotes the coding gain. In By solving (26), the optimum power allocation will be
this section, It will be proved that the proposed receiver can drawn as (α, β) = (0.94, 0.3412). Since k > 2.5735, we
achieve diversity up to the order of two which means that it can claim that the condition of property 2 is satisfied for all
achieves full diversity. We should notice that the error prob- terms with optimum power allocation.
ability of both users that demonstrated in (20) and (31) are
instantaneous error probabilities. For evaluating the diversity
order of proposed receiver, first the average BER of users will
7 Performance bound for general
be calculated, and later the diversity orders will be assessed
constellations
by bounding the average BER. Finally, by using proposi-
tion 1 (see “Appendix A” for proof) and proposition 2 (see
We want to prove that the proposed receiver achieves full-
“Appendix B” for proof) it will be proved that Pe1 and Pe2
diversity for any M-ary constellation A M . First, we evaluate
achieve full diversity order.
the union bound of a simple SIC receiver with two users.
Proposition 1: The expectation E{P1 }, where x is a posi-
Consider a system that consists of a BS and two users. If
tive constant and γmin = min{γ S R , γ R D } achieves diversity
the BS exploits NOMA for data transmission, the received
order of two.
signal at destinations will be,
√
2x(γ S D + γmin )
P1 = Q( ) yi = h i (αS1 + β S2 ) i = 1, 2 (35)
γmin
2 (33)
γS D + γR D )
User with greater power (user 1 in our notation) decode its
See the proof in “Appendix A”. symbols as
Proposition 2: If 16y 2 (x + z 2 ) − (y + z)4 > 0, the expec-
tation of (34) achieves diversity order of two, where x,y,z are
Sˆ1 = argmin{|y1 − h 1 αS1 |2 } (36)
positive constants and γmin = min{γ S R , γ R D }. S1 ∈A M
⎛ ⎞
√ Assuming equiprobable symbols, the error probability for the
⎜ 2(yγ S D − zγmin ) ⎟
P2 = Q( 2xγ S R )Q ⎜
⎝
⎟
⎠ (34) first user can be bounded as (37), where dmin and dmax denote
γmin
2 the minimum and maximum Euclidean distance between
γS D + γR D
symbols in constellation A M . At the worse case, the decoded
symbol can be located at distance of dmin /2 form the actual
See the proof in “Appendix A”. symbol in constellation.
With reference to (20), the upper bound of Pe1 can be
calculated by eliminating negative terms. All terms of the
1 $
M−1
upper bound are in the form of proposition 1 and 2. Since Pe1 = Pe1 |S2 =Sn ≤ Pe1 |S2 =SN
we have proved that the average of error probabilities which M
n=0
are in form of proposition 1 and 2, achieve diversity order of
dmin
two, it is clear that the strong user achieves full-diversity. = P h 1 (αS1 + β Sn ) + n 1 − h 1 αS1 ≤ |h 1 |α
2
For the weak user, in the same manner of the strong user, d
2 α|h 1 | − β|h 1 ||Sn |
min
first the upper bound will be calculated by removing nega- =Q √
tive elements. By taking the same steps, we can see that all N0 /2
⎛ ⎞
elements of the upper bound of Pe2 are in the form of propo-
α|h 1 | dmin − |h |β dmax
≤ Q⎝ 2 ⎠
1
sition 1 and 2, and based on these theorems, will achieve 2
(37)
diversity order of two. Since all elements of Pe2 achieve N0
2
diversity order of two, we can claim that the proposed receiver
achieves full-diversity order for weak user too.
To use proposition 2 for diversity analysis, we should be where S N denotes the nearest point in the constellation to S1 .
confident that the condition is satisfied. Proposition 3 pro- The weak user should apply SIC. Decision rule for this user
vides a lower bound for power allocation ratio that guarantees is,
diversity order of proposed receiver.
Proposition 3: If k > 2.5735 (k = βα ), the error probability Ŝ2 = arg min{| yˆ2 − h 2 β S2 |2 }
of both users decays with order of two in high SNR regime. S2 ∈S M (38)
See the proof in “Appendix A”. yˆ2 = y2 − h 2 α Sˆ1 = h 2 α(S1 − Sˆ1 ) + h 2 β S2 + n 2
123
234 A. Olfat
0
The error probability of weak user depends on the detection 10
of Sˆ1 . User1
User2
10
-1
dmin
Pe2 ≤ (1 − Pe1 ) × P n 2 ≥ β|h 2 |
2
(39) -2
dmin 10
+ Pe1 × P h 2 α(S1 − Sˆ1 ) + n 2 ≥ β|h 2 |
BER
2
-3
10
Finally, the union bound of error probability for weak user
can be bounded by,
-4
⎛ ⎞ 10
β|h 2 | dmin
2 − h 2 αdmax ⎠
Pe2 ≤ Pe1 Q ⎝
N0 -5
10
2 0 5 10 15 20 25
β|h 2 | dmin β|h 2 |dmin
+ (1 − Pe1 )Q( 2 )≤Q √
N0 2N0 (40) Fig. 2 Error probability of proposed receiver with BPSK modulation
2 where signal to noise ratio set as (41) and power allocation is obtained
βdmin |h 2 | − 2|h 2 |αdmax by exhaustive search from (26)
+Q √
2N0
αdmin |h 2 | − |h 2 |βdmax 10
0
×Q √ Theory-user1
Theory-user2
2N0 -1
Simulation-user1
Simulation-user2
10
8 Simulation result 10
-6
123
Resource allocation and BER performance analysis... 235
10
0 0
User 1
User1-appriximation
User 2
User2-approximation
-1
-1 User1
10
User2
-2
-2
10
log(BER)
BER
-3
-3
10
-4
-4
10
-5
-5
10 -6
0 5 10 15 20 25
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Fig. 4 Error probability of users when SNR set as (41) and power Fig. 5 Error probability of users versus α when SNR set as (41) and
allocation set as (26) and (30) γ̄ = 20
0
10
User1-without relay
User2-without relay
In Sect. 5, an approximate power allocation for BPSK User1-with relay
modulation is proposed as (30). To evaluate the accuracy User2-with relay
-2
10
of proposed power adjustment, in the third experiment,
the approximate power allocation applied. First, the power
adjusted based on the the solution of (26) by step of 0.001,
BER
-4
and then using (30). Error probability of two scenarios pre- 10
sented in Fig. 4.
From this figure, we can conclude that the proposed
approximation for optimum power allocation is accurate. 10
-6
123
236 A. Olfat
10
0
10 0
User1-BPSK User-1 Proposed
User-1 ML
User2-BPSK
-1 User1-4QAM
10
User2-4QAM 10 -2
-2
10
10 -4
-3
10
-4 10 -6
10
-5
10
0 5 10 15 20 25 10 -8
0 5 10 15 20 25 30 35
10
0
9 Conclusion
User1-same power
User2-same power
-1 User1-different power
In this paper, we proposed a receiver for downlink of a coop-
10
User2-different power erative system with two users that exploit non-orthogonal
multiple access for data transmission. The proposed receiver
10
-2 combines the received signals form direct and cooperative
links and employs successive interference cancellation to
BER
Conflict of interest The authors have not disclosed any competing inter-
the same manner, and the optimal power allocation can be ests.
founded by searching among valid regions. BER of both sce-
narios is plotted in Fig. 8 when SNRs adjusted as (41). From
this figure we can claim that the performance of both scenar- Appendix A
ios is very similar. In Fig. 9 we have compared the BER of
proposed detector with the so called Maximum Likelihood Proof of proposition 1
(ML) detector which has the best BER performance and is a
benchmark for measuring BER performance. Our proposed Since γmin = min{γ S R , γ R D }, γmin ≤ γ R D . Hence, an upper
bound for (33) can be derived as,
method’s performance is quite close to ML detector while
its complexity is much lower than ML. The ML detector,
conducts exhaustive search for detection of symbols through P1 ≤ E Q(x 2(γ S D + γmin ))
maximization of a nonlinear objective function. % ∞% ∞% ∞
≤ exp(−x 2 (γ S D + γmin )) f γ S D f γ S R f γ R D
0 0 0
123
Resource allocation and BER performance analysis... 237
Proof of proposition 2 % ∞% ∞%
zγmin
y 1
U= exp(−γ S R x)
0 0 0 2
We can claim P2 < Y + U , where
1 γS R 1 γR D
× exp(− ) exp −
% γS R γ S¯ R γ R D γ R¯ D
∞% ∞% ∞ 1 1 (47)
Y = exp(−xγ S R ) 1 γS D
zγmin 2 2 × exp − dγ S D dγ R D dγ S R =
0 0 y γS D γ S¯D
z γ S¯ R γ R¯ D
(yγ S D − zγmin ) 2
,
× exp − 2ξ(γ S¯ R x + 1)
γ S D + γmin
(43)
× f γ S D f γ S R f γ R D dγ S D dγ R D dγ S R
where ξ = z γ S¯ R γ R¯ D + γ S¯D [x y γ S¯ R γ R¯ D + y γ R¯ D + y γ S¯ R ].
% ∞ % ∞ % zγmin
y 1 If η1 = 0, we can claim that P2 decays with order of two,
U= exp(−xγ S R )
0 0 0 2 when γ̄ tends to infinity.
f γ S D f γ S R f γ R D dγ S D dγ S R dγ R D
Appendix C
For calculating Y we use this inequality.
Proof of proposition 3
% ∞
(yγ S D − zγmin )2 γS D
exp − exp − dγ S D ≤ Based on (20) and (31), we should note that the possible
zγmin γ S D + γmin γ S¯D
y
& ' values for x,y and z are:
(y + z) 4 γ S¯D
exp −γmin z 2 − × 2
16(y + γ S¯D )
2 1 (y γ S¯ D + 1)
2 x, y, z : α + β, α − β, β
!
(y + z)2
× 1 + y 2 γ S¯D + (1 + y 2 γ S¯D )γmin γ S¯D π There are two general classes which require satisfaction of
4 proposition 2 condition. The first class is attributed to the
(44) terms in which y = z. For this class, the condition of propo-
sition 2 will be reduced to 16x y 2 . Since the coefficients of x
The upper bound of this inequality is drawn using, and y are positive the condition will be always satisfied.
For the second class, there are two terms which require the
satisfaction of the condition 16y 2 (x +z 2 )−(y +z)4 > 0. The
(yγ S D − γmin )2 coefficients of the first term are x = α + β, y = α − β, z =
γ S D + γmin α + β. We consider a scenario in which α = kβ. After some
(45)
(y + z)2 √ calculations, the inequality of proposition 2 can be written
≤ y γ S D + z γmin
2 2
− γ S D γmin as:
2
123
238 A. Olfat
k 3 − (1 + 2β)k 2 − k + 1 + β > 0 (48) 4. Wu, Q., Chen, W., Ng, D. W. K., & Schober, R. (2018). Spectral
and energy efficient wireless powered iot networks: Noma or tdma?
IEEE Transactions on Vehicular Technology.
To find an approximate solution for this inequality, we limit
5. Ding, Z., Zhao, Z., Peng, M., & Poor, H. V. (2017). On the spectral
the search region by considering the equation below, efficiency and security enhancements of noma assisted multicast-
unicast streaming. IEEE Transactions on Communications, 65(7),
k 3 − (1 + 2β)k 2 − k > 0 (49) 3151–3163.
6. Islam, S. R., Avazov, N., Dobre, O. A., & Kwak, K.-S. (2017).
Power-domain non-orthogonal multiple access (noma) in 5g sys-
If the variable k satisfies (49), the equation (48) will be satis- tems: Potentials and challenges. IEEE Communications Surveys &
fied too. By solving this inequality, the valid value for k can Tutorials, 19(2), 721–742.
be calculated as (k > 0): 7. Yue, X., Qin, Z., Liu, Y., Kang, S., & Chen, Y. (2018). A unified
framework for non-orthogonal multiple access. IEEE Transactions
on Communications,
(2β + 1) + (2β + 1)2 + 4
k> (50) 8. Nguyen, V.-D., Tuan, H. D., Duong, T. Q., Poor, H. V., & Shin, O.-
2 S. (2017). Precoder design for signal superposition in mimo-noma
multicell networks. IEEE Journal on Selected Areas in Communi-
Based on power assignment constraint (α 2 + β 2 = 1), β can cations, 35(12), 2681–2695.
be computed as, 9. Yuan, L., Pan, J., Yang, N., Ding, Z., & Yuan, J. (2018). Successive
interference cancellation for ldpc coded non-orthogonal multiple
access systems. IEEE Transactions on Vehicular Technology.
1 10. Verdu S. (1998). et al., Multiuser detection.Cambridge university
β=
1 + k2 press.
11. Gupta, A. S., & Singer, A. (2007). Successive interference cancel-
By applying a recursive calculation with initial value of β = lation using constellation structure. IEEE Transactions on Signal
1, the approximate solution of (49) will be, Processing, 55(12), 5716–5730.
12. Ding, Z., Fan, P., & Poor, H. V. (2016). Impact of user pairing on
5g nonorthogonal multiple-access downlink transmissions. IEEE
k = 2.2547, β = 0.4054 Trans. Vehicular Technology, 65(8), 6010–6023.
13. Lei, L., Yuan, D., Ho, C. K., & Sun, S. (2016). Power and chan-
The coefficients of the second term are x = α−β, y = α−β, nel allocation for non-orthogonal multiple access in 5g systems:
Tractability and computation. IEEE Transactions on Wireless Com-
z = α + β. By substituting the coefficients, the resulting munications, 15(12), 8580–8594.
inequality will be, 14. Kramer, G., Gastpar, M., & Gupta, P. (2005). Cooperative strategies
and capacity theorems for relay networks. IEEE Transactions on
k 3 − (3 − 2β)k 2 + 3k − 1 + β > 0 (51) Information Theory, 51(9), 3037–3063.
15. Do, T. N., da Costa, D. B., Duong, T. Q., & An, B. (2018).
Improving the performance of cell-edge users in noma systems
Since k > 1, k − 1 + β is positive; we can use the inequality using cooperative relaying. IEEE Transactions on Communica-
below, tions, 66(5), 1883–1901.
16. Laneman, J. N., Tse, D. N., & Wornell, G. W. (2004). Coopera-
k 3 − (3 − 2β)k 2 + 2k > 0 (52) tive diversity in wireless networks: Efficient protocols and outage
behavior. IEEE Transactions on Information theory, 50(12), 3062–
3080.
The delta function of this inequality is, 17. Sendonaris, A., Erkip, E., & Aazhang, B. (2003). User cooper-
ation diversity. part i. system description. IEEE Transactions on
δ = (3 − 2β)2 − 8 communications, 51(11), 1927–1938.
18. Yue, X., Liu, Y., Kang, S., Nallanathan, A., & Ding, Z. (2018).
Exploiting full/half-duplex user relaying in noma systems. IEEE
Hence, if k > 2.2547, both of (48) and (51) inequalities will Transactions on Communications, 66(2), 560–575.
be true. 19. Xu, M., Ji, F., Wen, M., & Duan, W. (2016). Novel receiver design
for the cooperative relaying system with non-orthogonal multiple
access. IEEE Communications Letters, 20(8), 1679–1682.
References 20. Ding, Z., Peng, M., & Poor, H. V. (2015). Cooperative non-
orthogonal multiple access in 5g systems. IEEE Communications
1. Ding, Z., Lei, X., Karagiannidis, G. K., Schober, R., Yuan, J., Letters, 19(8), 1462–1465.
& Bhargava, V. (2017). A survey on non-orthogonal multiple access 21. Fang, F., Zhang, H., Cheng, J., & Leung, V. C. (2016). Energy-
for 5g networks: Research challenges and future trends. arXiv efficient resource allocation for downlink non-orthogonal multiple
preprint. arXiv:1706.05347 access network. IEEE Transactions on Communications, 64(9),
2. Chen, S., Ren, B., Gao, Q., Kang, S., Sun, S., & Niu, K. (2017). 3722–3732.
Pattern division multiple access-a novel nonorthogonal multiple 22. Sedaghat, M. A., & Müller, R. R. (2018). On user pairing in uplink
access for fifth-generation radio networks. IEEE Transactions on noma. IEEE Transactions on Wireless Communications, 17(5),
Vehicular Technology, 66(4), 3185–3196. 3474–3486.
3. Chen, Z., Ding, Z., Dai, X., & Zhang, R. (2017). An optimization 23. Liang, W., Ding, Z., Li, Y., & Song, L. (2017). User pairing for
perspective of the superiority of noma compared to conventional downlink non-orthogonal multiple access networks using matching
oma. IEEE Trans. Signal Process, 65(19), 5191–5202.
123
Resource allocation and BER performance analysis... 239
algorithm. IEEE Transactions on Communications, 65(12), 5319– Ali Olfat received his Ph.D. from
5332. the University of Tehran, Iran in
24. Wang, T., Cano, A., Giannakis, G. B., & Laneman, J. N. (2007). Electrical Engineering in 2004.
High-performance cooperative demodulation with decode-and- During 2004 and 2005, he was a
forward relays. IEEE Transactions on Communications, 55(7), research associate with the Kings
1427–1438. College London, United Kingdom.
He joined the school of Electrical
and Computer Engineering, Uni-
Publisher’s Note Springer Nature remains neutral with regard to juris- versity of Tehran as an assistant
dictional claims in published maps and institutional affiliations. professor in 2006. He is currently
a professor at communication engi-
Springer Nature or its licensor (e.g. a society or other partner) holds neering department and director
exclusive rights to this article under a publishing agreement with the of Signal Processing and Commu-
author(s) or other rightsholder(s); author self-archiving of the accepted nication Systems Laboratory and
manuscript version of this article is solely governed by the terms of such Digital Communications Labora-
publishing agreement and applicable law. tory. He has served as director of communication engineering depart-
ment between 2012 and 2014. His research interests are cooperative
communications, Information theory, statistical and adaptive signal
processing, array signal processing, detection and estimation theory
and MIMO communication systems.
123