2019
DOI: 10.1049/iet-com.2018.5897
|View full text |Cite
|
Sign up to set email alerts
|

Power‐splitting relaying protocol for wireless energy harvesting and information processing in NOMA systems

Abstract: (2019) A power-splitting relaying protocol for wireless energy harvesting and information processing in NOMA systems. IET Communications, 13 (14). pp. 2132-2140.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
27
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(27 citation statements)
references
References 26 publications
0
27
0
Order By: Relevance
“…We discuss the feasibility of the KKT condition for the NDR network given in (19) to (38). In the first step, we examine those in (29), (30), (31), (32) and (38). Since P 1 , P 2 , P 3 and P 4 are positive numbers which ensures data transmission is performed in both the upper and the lower branches, λ 6 , λ 7 , λ 8 and λ 9 must be zeros undoubtedly.…”
Section: Appendix Bmentioning
confidence: 99%
See 1 more Smart Citation
“…We discuss the feasibility of the KKT condition for the NDR network given in (19) to (38). In the first step, we examine those in (29), (30), (31), (32) and (38). Since P 1 , P 2 , P 3 and P 4 are positive numbers which ensures data transmission is performed in both the upper and the lower branches, λ 6 , λ 7 , λ 8 and λ 9 must be zeros undoubtedly.…”
Section: Appendix Bmentioning
confidence: 99%
“…Consequently, (29), (30), (31) and (32) are inactive conditions. Though we exclude (29) through (32) in the optimization, determining whether λ 1 and λ 2 are zeros or positive numbers is still hard. To reveal this, we temporarily change to discuss whether C 1 equals C 3 and C 2 equals C 4 .…”
Section: Appendix Bmentioning
confidence: 99%
“…a NU, is given a lower power allocation factor than a weak user, i.e. a FU, to ensure user fairness [1], [5]- [7]. Two key techniques applied in NOMA consist of superposition coding (SC) [2] and successive interference cancellation (SIC) [1]- [2].…”
Section: Introductionmentioning
confidence: 99%
“…More, by forwarding the information to far user, the relay based SWIPT C-NOMA can improve the integrity and reliability of the transmitted data for weak users [13]. Power splitting protocol (PSR) and time switching protocol (TSR) are exploited at SWIPT based relaying nodes to harvest energy and process information [5]- [6], [14]- [15]. In [16], the sum throughput of users in SWIPT based C-NOMA system was studied.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation