SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Bulletin of Electrical Engineering and Informatics
Vol. 10, No. 3, June 2021, pp. 1380∼1387
ISSN: 2302-9285, DOI: 10.11591/eei.v10i3.2298 r 1380
Outage performance users located outside D2D coverage
area in downlink cellular network
Thanh-Luan Nguyen, Dinh-Thuan Do
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh City, Vietnam
Article Info
Article history:
Received May 24, 2020
Revised Apr 4, 2021
Accepted Apr 21, 2021
Keywords:
Device-to-device
Stochastic geometry
Outage probability
ABSTRACT
Device-to-device (D2D) communication has been proposed to employ the proximity
between two devices to enhance the overall spectrum utilization of a crowded cellular
network. With the help of geometric probability tools, this framework considers the
performance of cellular users under spatial separation with the D2D pair is investi-
gated. The measurement results and analytical expression of outage probability show
that the proposed frameworks improve the outage performance at a high signal-to-
noise ratio (SNR) at the base station. Results also interpret that the distances between
nodes in the D2D-assisted network make slight impacts on the performance of the
cellular user.
This is an open access article under the CC BY-SA license.
Corresponding Author:
Dinh-Thuan Do
Faculty of Electronics Technology
Industrial University of Ho Chi Minh City
12 Nguyen Van Bao Road, Go Vap District, Ho Chi Minh City, Vietnam
Email: dodinhthuan@iuh.edu.vn
1. INTRODUCTION
Device to device (D2D) communication has recently been introduced in 3rd-generation partnership
project (3GPP) long term evolution (LTE) Release 12 and 13. D2D, together with the core technologies, is
proposed for forthcoming 5th generation (5G) cellular standard. In wireless cellular networks, the device-to-
device (D2D) communications allow devices in close proximity to transmit and receive signals directly without
connecting with base stations (BSs). Therefore, to reduce the high load from core networks, D2D has been
recognized as a reasonable technique [1]-[3]. Together operation of the cellular network, the D2D devices
are able to share the same spectrum resources with cellular users (CUs), and the spectral efficiency can be
enhanced. In principle, D2D and cellular communication links are categorized into two kinds, including the
overlay and underlay spectrum sharing techniques [4]. D2D users can only utilize the idle spectrum that is not
currently employed by the CUs in the overlay D2D mode. The underlay spectrum sharing mode permits D2D
pair users to occupy the resource of the cellular connections. The co-channel interference between the D2D and
cellular links occurs, and such limitations need to be addressed. Therefore, the resource allocation problems
are studied in D2D communications underlaying the cellular networks [5]-[7]. In [5], to maximize the sum rate
of D2D links, the authors presented a power allocation scheme, and guarantee the performance of the cellular
link at the same time. In order to maximize the rate of the single D2D link in [6], power allocation for D2D
and cellular links is studied. The multiple cellular and D2D links are investigated in [7].
Considering the advantages of D2D communication, There are some studies on the usage of D2D com-
munications in [8]-[12]. The cellular networks require high maintenance costs and additional infrastructure,
and more difficulties with a large amount of equipment. In order to address these challenges, D2D communica-
Journal homepage: http://beei.org
Bulletin of Electr Eng & Inf ISSN: 2302-9285 r 1381
tions have been proposed as an essential technique to implement with non-orthogonal multiple access (NOMA)
networks, the heterogeneous network recently [13]-[19].
To study a large number of nodes at various locations in D2D, stochastic geometry is a sophisticated
tool from mathematics to provide insights into spatial averages taken over several realizations. Many metrics
can be evaluated, such as outage probability, interference, data rate, and signal-to-interference-plus-noise ratio
(SINR) [20],[21]. Stochastic geometry can be employed to design many applications related to D2D [22],[23].
Moreover, the published works [24]-[28] also study the performance of underlay D2D networks. The outage
probability of random D2D communication in millimeter-wave cellular networks is studied in [24]. Moreover,
the authors in [25] investigate the performance over nakagami-m fading channels. The paper [26] also attempts
to investigate the secure property of the D2D network. An interesting model where multiple D2D pairs are
deployed is proposed in [27]. An extension to full-duplex communication for the D2D network is introduced
by [28]. In the above works, there is no concern over the spatial separation between the cellular network and
the D2D network. In addition, statistical properties of the distance between users in cellular networks and D2D
networks under the nodal distancing constraint have not been reported in the literature.
Motivated by these analysis, this paper examines outage performance of traditional users located in
outside of D2D serving area in cellular network.
2. SYSTEM MODEL
We consider a downlink wireless network in which there is a base station (BS), a cellular user (CUE)
sharing resources with a D2D transmitter (D2D-Tx), as plotted in Figure 1. The CUE is uniformly distributed
inside the cellular coverage area with radius Rc around the BS. In addition, the CUE is located outside the D2D
coverage area with radius Rd  Rc around the D2D-Tx. We facilitate each node with a single antenna.
Further, the channel coefficients of the links from the BS and from the D2D-Tx to the CUE are de-
noted by h and g, respectively. We assume all channels to be experiencing independent Rayleigh fading with
E[|h|2
] = E[|g|2
] = 1. To capture the large-scale propagation, we adopt the power-law path-loss model where
R and L are the corresponding distances to the CUE, and η denotes the pathloss exponent. Moreover, we
assume a block-fading model in which all channels are invariant during the transmission of a block and vary
independently among different blocks.
Rc
Cellular
Coverage Area
D2D
Coverage Area
g,L
CUE
Rd
Dt
h,R
D2D-Tx
Information Link
Interference Link
Figure 1. The proposed underlay D2D communication network.
In the downlink, the CUE receives the information signal from the BS while being interfered by the
D2D-Tx. Subsequently, the received signal at the CUE is given by
y =
p
Pbx
h
√
Rη
+
p
Pts
g
√
Lη
+ n, (1)
Outage performance users located outside D2D coverage area in downlink ... (Thanh-Luan Nguyen)
1382 r ISSN: 2302-9285
in which Pb and Pt are the transmit powers from the BS and the D2D-Tx, respectively, x and s are the corre-
sponding signals. Herein, E[|x|2
] = E[|s|2
] = 1, and n denotes the additive white Gaussian noise (AWGB) at
the CUE with zero mean and variance σ2
. Hence, the achievable instantaneous rate at the given CUE is
R = log2 1 +
Pb
|h|2
Rη
Pt
|g|2
Lη + σ2
!
. (2)
3. DISTANCE DISTRIBUTION
This section studies the stochastic properties of the link distances. Particularly, the CDF and PDF of
the distances R and L are derived in closed-form. It should be mentioned that both L and R are dependent on
the location of the CUE.
3.1. Preliminaries
In this subsection, we specify the distribution, i.e., CDF and PDF, of the distance from a fixed point A
to the random point C. Particularly, the point C uniformly distributed inside the circular area with the radius R
around a fixed point B, i.e., C ∈ C(B, R). The distance probability distribution function is considered in two
different cases as depicted in [29, Eq.(34)], and can be formulated as
FAC(AC) =
|C(A, AC) ∩ C(B, R)|
|C(B, R)|
, AB − R  AC  AB + R, (3)
in which | · | denotes the Lebesgue measure. Denoting AT OT , C(A, AC) ∩ C(B, R), for the case AB ≥ R,
|AT OT | is calculated as by [29]
|AT OT | =
π
2
(AC2
+ R2
) − AC2
sin−1

AB2
+ AC2
− R2
2AC.AB

+ R2
sin−1

AC2
− AB2
− R2
2R.AB

−
1
2
p
(AC2 − (AB − R)2)((AB + R)2 − AC2) , S(AB, R; AC), (4)
with AB − R ≤ AC ≤ AB + R. For the case AB ≤ R, the area of AT OT is obtained as [29]
|AT OT | =
(
πAC2
, 0 ≤ AC ≤ R − AB
S(AB, R; AC) , R − AB ≤ AC ≤ R + AB
(5)
3.2. The information links
Initially, let AC be the 2D-Euclidean space in which the CUE uniformly distributed and AD be the
coverage area around the D2D-Tx. To reduce the cross-mode interference, the interference from the D2D-Tx
to the CUE and vice versa, it is assumed that AC and AD are disjoint meaning that the CUE is located outside
the D2D proximity. Hence, the CDF of R is given as
FR(r) =
|C(BS, r)AD|
|AC|
, 0  r  Rc. (6)
Denoting S , C(BS, r)AD, the above expression can further be derived via the four following cases.
a) Case Dt + Rd ≤ Rc ∧ Dt ≥ Rd:
As shown in Figure 2, |AC| = πR2
c − πR2
d and the calculation for |S| is divided into three following
subcases: 1) if 0  r  Dt − Rd, it is clearly that |S| = πr2
, 2) if DR + Rd  r  Rc, |S| = πr2
− πR2
d and
3) if Dt − Rd  r  Dt + Rd, thus
|S| = |C(BS, r)| − |C(BS, r) ∩ AD| = πr2
− S(Dt, Rd; r). (7)
Now, the corresponding PDF is obtained by substituting (7) into (6) and then taking the derivative of
the resulted FR(r), thus
fR(r) =
1
πR2
c − πR2
d







2πr , 0  r  Dt − Rd
πr + 2r sin−1

D2
t +r2
−R2
d
2Dtr

, Dt − Rd  r  Dt + Rd
2πr , Dt + Rd  r  Rc
(8)
Bulletin of Electr Eng  Inf, Vol. 10, No. 3, June 2021 : 1380 – 1387
Bulletin of Electr Eng  Inf ISSN: 2302-9285 r 1383
Note that [29]
∂
∂AC
S(AB, R; AC) = πAC − 2AC sin−1

AB2
+ AC2
− R2
2AB.R

. (9)
b) Case Dt + Rd ≤ Rc ∧ Dt ≤ Rd:
As shown in Figure 3, |AC| = πR2
c − πR2
d and |S| is derived as following subcases: 1) if 0  r 
Rd − Dt, thus |S| = 0, 2) if Dt + Rd  r  Rc, thus |S| = πr2
− πR2
d , and 3) if Dt − Rd  r  Dt + Rd,
|S| = πr2
− S(Dt, Rd; r).
As a result, the corresponding PDF is given by
fR(r) =
1
πR2
c − πR2
d







0 , 0  r  Rd − Dt
πr + 2r sin−1

D2
t +r2
−R2
d
2Dtr

, Dt − Rd  r  Dt + Rd
2πr , Dt + Rd  r  Rc
(10)
c) Case Dt + Rd ≥ Rc ≥ Dt − Rd:
The cellular coverage is given as |AC| = πR2
c − |A| where A = C(BS, Rc) ∩ AD as shown in Figure
4. It is known that [30]
|A| =R2
d cos−1

D2
t + R2
d − R2
c
2DtRd

+ R2
c cos−1

D2
t + R2
c − R2
d
2DtRc

−
1
2
p
(−Dt + Rd + Rc)(Dt + Rd − Rc)(Dt − Rd + Rc)(Dt + Rd + Rc). (11)
In this case, |S| can be derived via the two following subcases: 1) if 0  r  Rd −Dt, thus |S| = πr2
,
and 2) if Dt − Rd  r  Dt + Rd, |S| = πr2
− S(Dt, Rd; r).
Hence, the PDF of the distance of the information link is then obtained as
fR(r) =
1
πR2
c − |A|
(
2πr , 0  r  Dt − Rd
πr + 2r sin−1

D2
t +r2
−R2
d
2Dtr

, Dt − Rd  r  Rc
(12)
d) Case Dt − Rd ≥ Rc:
In this case, C(BS, Rc)∩AD = ∅, thus the CDF and the PDF of the distance R are immediately given
as
FR(r) =
r2
R2
c
, 0  r  Rc, (13)
fR(r) =
2r
R2
c
, 0  r  Rc. (14)
Rc
Dt
Rd
r
Figure 2. A realization of
Dt + Rd ≤ Rc ∧ Dt ≥ Rd
Rc
Dt
Rd
r
Figure 3. A realization of
Dt + Rd ≤ Rc ∧ Dt ≤ Rd
Rc
Dt
Rd
r
Figure 4. A realization of
Dt + Rd ≥ Rc ≥ Dt − Rd
Outage performance users located outside D2D coverage area in downlink ... (Thanh-Luan Nguyen)
1384 r ISSN: 2302-9285
3.3. The interference links
In this subsection, the CDF and PDF of the link distance from the interfering D2D-Tx to the CUE are
studied. Similar to the previous parts, the CDF of the distance L is given as
FL(r) =
|AC ∩ C(D2D-Tx, r)|
|AC|
, 0  r  Dt + Rd. (15)
Note that we reuse the notation S , AC ∩ C(D2D-Tx, r) for the following analysis. Subsequently,
the above expression can further be derived via the three following cases.
a) Case Dt + Rd ≤ Rc:
Similarly, |AC| = πR2
c − πR2
d and |S| is derived by the following subcases. 1) if r  Rd, it is
obvious that |S| = 0, 2) if Rd  r  Rc − Dt, |S| = πr2
− πR2
d, and 3) if Rc − Dt  r  Rc + Dt,
|S| = S(Dt, Rc; r) − πR2
d. Subsequently, the PDF of the interference distance is then given as
fL(r) =
1
πR2
c − πR2
d







0 , 0  r  Rd
2πr , Rd  r  Rc − Dt
πr − 2r sin−1

D2
t +r2
−R2
c
2Dtr

, Rc − Dt  r  Rc + Dt
(16)
b) Case Dt + Rd ≥ Rc ≥ Dt − Rd:
Similar to the previous subsection, |AC| = πR2
c − |A| and |S| = S(Dt, Rd; r) − |A| if Rd  r 
Rd + Dt whereas |S| = 0 whenever r  Rd. Hence,
fL(r) =
1
πR2
c − |A|
(
0 , 0  r  Rd
πr − 2r sin−1

D2
t +r2
−R2
c
2Dtr

, Rd  r  Rc + Dt
(17)
c) Case Dt − Rd ≥ Rc:
In this case, |AC| = πR2
c and |S| is obtained as [...]
|S| =
(
S(Dt, Rc; r) , Dt − Rc  r  Dt + Rc
0 , 0  r  Dt − Rc
(18)
Substituting the above result into (15) and with the help of (9), one can the obtain
fL(r) =
1
πR2
c
(
πr − 2r sin−1

D2
t +r2
−R2
c
2Dtr

, Dt − Rc  r  Dt + Rc
0 , 0  r  Dt − Rc
(19)
4. OUTAGE PERFORMANCE
In this section, we investigate the outage probability of the proposed system. Let Rth be the target data
rate of the CUE, thus the probability for the instantaneous rate at this CUE falls below Rth is mathematically
expressed as
Pout = Pr{R  R̄th} (20)
=1 − Pr

|h|2
≥
Rη
γ̄th
γ̄b

γ̄t|g|2
Lη
+ 1

, (21)
in which γ̄th , 2Rth
−1, γ̄b , Pb/σ2
and γ̄t , Pt/σ2
. Now that |h| and |g| are both independent and identical
Rayleigh distributed random variables with unit variance, thus the CDF of |h|2
and the PDF of |g|2
are given
by
F|h|2 (x) = 1 − e−x
, x  0,
f|g|2 (x) = e−x
, x  0,
Bulletin of Electr Eng  Inf, Vol. 10, No. 3, June 2021 : 1380 – 1387
Bulletin of Electr Eng  Inf ISSN: 2302-9285 r 1385
respectively. Hence (21) can further be expressed as
Pout =1 − ER,|g|2,L

exp

−
Rη
γ̄th
γ̄b

γ̄t|g|2
Lη
+ 1

(22)
≈1 −
Rc
Z
0
exp

−
rη
γ̄th
γ̄b
(γ̄tḡ + 1)

fR(r)dr, (23)
in which (23) is proposed to approximate (22). The tightness of this approximation will be verified later in the
next section. Herein, ḡ denotes the mean interference channel power gain at the CUE and is calculated as
ḡ , E[|g|2
L−η
] =
Dt+Rc
Z
0
fL(l)
lη
dl. (24)
5. NUMERICAL RESULTS
In this section, Monte Carlo simulations are constrcuted to validate our analysis in the previous sec-
tions. The default settings for the results are Rc = 15 (m), Rd = 5 (m), Rth = 0.5 (bps/Hz), γ̄t = 10 (dB)
and η = 2. In addition, the average transmit SNR is set to γ̄b = 30 (dB) in the Figure 6.
0 5 10 15 20 25 30 35
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Outage
Probability
Simulation (Eq. (2))
Proposed Approximation (Eq. (22))
Figure 5. Outage probability at the CUE versus the average transmit signal-to-noise of the BS (γ̄b) and the
distance Dt (m)
Figure 5 shows the outage performance comparison of conventional user as changing Dt. It can be
seen that as varying Dt from 5 (m) to 12.5 (m), a small performance gap emerges. Increasing transmit SNR
at the BS contributes to improving outage performance. It is confirmed that analytical and simulation results
are matched very tight at the whole range of SNR. Hence, it can be believed that the proposed approximation
acceptably tight. Figure 6 further evaluates the mean interference channel power gain of the considered system
to validate our exact analysis for the link distance distribution.
Outage performance users located outside D2D coverage area in downlink ... (Thanh-Luan Nguyen)
1386 r ISSN: 2302-9285
0 5 10 15 20 25
1
2
3
4
5
6
7
8
9
10
11
10-3
Simulation
Analytical (Eq. (23))
Figure 6. Mean interference channel power gain at the CUE versus the distance Dt (m)
6. CONCLUSION
In this paper, we have studied the outage performance problem of a cellular user in the context of
the D2D underlying cellular network. The outage probability of users in D2D communication is computed.
Specifically, the distance from the cellular user to the BS and from the D2D transmitter to the user are both
statistically characterized using stochastic geometry tools. We also derived the exact and approximated expres-
sions of outage probability at the cellular node. Numerical results are provided to verify our derivations. The
paper is, however, limited at downlink single-cell networks, and will be extended to the multi-cell sencario in
our future works.
REFERENCES
[1] K. Doppler, M. Rinne, C. Wijting, C. Ribeiro, and K. Hugl, ”Device-todevice communication as an underlay to
LTE-advanced networks,” IEEE Commun. Mag., vol. 47, no. 12, pp. 42–49, Dec. 2009.
[2] G. Fodor et al., ”Design aspects of network assisted device-to-device communications,” IEEE Commun. Mag., vol.
50, no. 3, pp. 170–177, Mar. 2012.
[3] J. Liu, Y. Kawamoto, H. Nishiyama, N. Kato, and N. Kadowaki, ”Device-to-device communications achieve efficient
load balancing in LTE-advanced networks,” IEEE Wirel. Commun. Mag., vol. 21, no. 2, pp. 57–65, Feb. 2014.
[4] X. Lin, J. G. Andrews, and A. Ghosh, ”Spectrum sharing for deviceto-device communication in cellular networks,”
IEEE Trans. Wirel. Commun., vol. 13, no. 12, pp. 6727–6740, Dec. 2014.
[5] C.-H. Yu, O. Tirkkonen, K. Doppler, and C. Ribeiro, ”On the performance of device-to-device underlay communica-
tion with simple power control,” Proc. VTC, Apr. 2009, pp. 1–5.
[6] J. Wang, D. Zhu, C. Zhao, J. C. F. Li, and M. Lei, ”Resource sharing of underlaying device-to-device and uplink
cellular communications,” IEEE Commun. Lett., vol. 17, no. 6, pp. 1148–1151, Jun. 2013.
[7] D. Feng, L. Lu, Y. Yuan-Wu, G. Y. Li, G. Feng, and S. Li, ”Deviceto-device communications underlaying cellular
networks,” IEEE Trans. Commun., vol. 61, no. 8, pp. 3541–3551, Aug. 2013.
Bulletin of Electr Eng  Inf, Vol. 10, No. 3, June 2021 : 1380 – 1387
Bulletin of Electr Eng  Inf ISSN: 2302-9285 r 1387
[8] J. Liu, N. Kato, J. Ma, and N. Kadowaki, ”Device-to-device communication in LTE-advanced networks: A survey,”
IEEE Commun. Surv. Tuts., vol. 17, no. 4, pp. 1923–1940, 4th Quart., 2015.
[9] F. Jameel, Z. Hamid, F. Jabeen, S. Zeadally, and M. A. Javed, ”A survey of device-to-device communications: Re-
search issues and challenges,” IEEE Commun. Surv. Tuts., vol. 20, no. 3, pp. 2133–2168, 3rd Quart., 2018.
[10] P. Gandotra and R. K. Jha, ”Device-to-device communication in cellular networks: A survey,” J. Netw. Comput. Appl.,
vol. 71, pp. 99–117, Aug. 2016.
[11] H. A. U. Mustafa, M. A. Imran, M. Z. Shakir, A. Imran, and R. Tafazolli, ”Separation framework: An enabler for
cooperative and D2D communication for future 5G networks,” IEEE Commun. Surv. Tuts., vol. 18, no. 1, pp. 419–445,
1st Quart., 2016.
[12] M. Höyhtyä, O. Apilo, and M. Lasanen, ”Review of latest advances in 3GPP standardization: D2D communication
in 5G systems and its energy consumption models,” Future Internet, vol. 10, no. 1, p. 3, 2018.
[13] D. Feng et al., ”Mode switching for energy-efficient device-to-device communications in cellular networks,” IEEE
Trans. Wirel. Commun., vol. 14, no. 12, pp. 6993–7003, Dec. 2015.
[14] X. Lin, J. G. Andrews, and A. Ghosh, ”Spectrum sharing for deviceto-device communication in cellular networks,”
IEEE Trans. Wirel. Commun., vol. 13, no. 12, pp. 6727–6740, Dec. 2014.
[15] L. Zhang, M. Xiao, G. Wu, and S. Li, ”Efficient scheduling and power allocation for D2D-assisted wireless caching
networks,” IEEE J. Sel. Areas Commun., vol. 64, no. 6, pp. 2438–2452, Jun. 2016.
[16] S. Xu, H. Zhang, J. Tian, and P. T. Mathiopoulos, ”Pilot reuse and power control of D2D underlaying massive MIMO
systems for energy efficiency optimization,” Sci. China Inf. Sci., vol. 60, no. 10, 2017, Art. no. 100303.
[17] Dinh-Thuan Do, A.-T. Le, C.-B. Le and B. M. Lee, ”On Exact Outage and Throughput Performance of Cognitive
Radio based Non-Orthogonal Multiple Access Networks With and Without D2D Link,” Sensors, 19 (15): 3314, 2019.
[18] C.-B. Le and Dinh-Thuan Do, ”Joint Evaluation of Imperfect SIC and Fixed Power Allocation Scheme for Wireless
Powered D2D-NOMA networks with multiple antennas at Base Station,” Wireless Networks, vol. 25, no. 8, pp.
5069–5081, 2019
[19] H.P.-Dang, Dinh-Thuan Do, et al, ”Power Beacon-based Wireless Power Transfer in MISO/SISO: An application in
Device-to-Device networks,” Wireless Personal Communications (Springer), Vol. , No. , pp. , 2019.
[20] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, ”Stochastic geometry and random graphs
for the analysis and design of wireless networks,” IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029–1046, Sep.
2009.
[21] H. Elsawy, E. Hossain, and M. Haenggi, ”Stochastic geometry for modeling, analysis, and design of multi-tier and
cognitive cellular wireless networks: A survey,” IEEE Commun. Surv. Tuts., vol. 15, no. 3, pp. 996–1019, Jun. 2013.
[22] O. A. Amodu, M. Othman, N. K. Noordin and I. Ahmad, ”Relay-Assisted D2D Underlay Cellular Network Analysis
Using Stochastic Geometry: Overview and Future Directions,” IEEE Access, vol. 7, pp. 115023-115051, 2019.
[23] D. Singh and S. C. Ghosh, ”Mobility-Aware Relay Selection in 5G D2D Communication Using Stochastic Model,”
IEEE Trans. Veh. Technol., vol. 68, no. 3, pp. 2837-2849, March 2019.
[24] S. Kusaladharma, Z. Zhang and C. Tellambura, ”Interference and Outage Analysis of Random D2D Networks Un-
derlaying Millimeter-Wave Cellular Networks,” IEEE Trans. Commun., vol. 67, no. 1, pp. 778-790, Jan. 2019.
[25] I. Singh, R. K. Jaiswal, V. Kumar, R. Verma, N. P. Singh and G. Singh, ”Outage Probability of Device-to-Device
Communication Underlaying Cellular Network over NakagamiRayleigh Fading Channels,” 2019, 9th International
Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-
19), Nagpur, India, 2019, pp. 1-5.
[26] J. Lyu, T. Zheng, K. Huang, Y. Feng and H. Wang, ”Secure Transmissions of D2D Underlay Cellular Networks with
Poisson Cluster Process,” 2019, IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA,
2019, pp. 1-6.
[27] J. Lee and J. H. Lee, ”Performance Analysis and Resource Allocation for Cooperative D2D Communication in
Cellular Networks With Multiple D2D Pairs,” IEEE Commun. Lett., vol. 23, no. 5, pp. 909-912, May 2019.
[28] G. Liu, W. Feng, Z. Han and W. Jiang, ”Performance Analysis and Optimization of Cooperative Full-Duplex D2D
Communication Underlaying Cellular Networks,” IEEE Trans. Wirel. Commun, vol. 18, no. 11, pp. 5113-5127, Nov.
2019.
[29] F. Adelantado, J. Prez-Romero, and O. Sallent, “Nonuniform traffic distribution model in reverse link of multi-
rate/multiservice wcdma-based systems,” IEEE Trans. Veh. Technol., vol. 56, no. 5, p. 29022914, Sep. 2007.
[30] Weisstein, Eric W. ”Circle-Circle Intersection.” From MathWorld–A Wolfram Web Resource.
http://mathworld.wolfram.com/Circle-CircleIntersection.html
Outage performance users located outside D2D coverage area in downlink ... (Thanh-Luan Nguyen)

Weitere ähnliche Inhalte

Was ist angesagt?

Analysis of near field distribution variation using awas electromagnetic code...
Analysis of near field distribution variation using awas electromagnetic code...Analysis of near field distribution variation using awas electromagnetic code...
Analysis of near field distribution variation using awas electromagnetic code...csandit
 
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...TELKOMNIKA JOURNAL
 
Gain enhancement of microstrip patch antenna using artificial magnetic conductor
Gain enhancement of microstrip patch antenna using artificial magnetic conductorGain enhancement of microstrip patch antenna using artificial magnetic conductor
Gain enhancement of microstrip patch antenna using artificial magnetic conductorjournalBEEI
 
Design and Analysis of Ku/K-band Circular SIW Patch Antenna Using 3D EM-based...
Design and Analysis of Ku/K-band Circular SIW Patch Antenna Using 3D EM-based...Design and Analysis of Ku/K-band Circular SIW Patch Antenna Using 3D EM-based...
Design and Analysis of Ku/K-band Circular SIW Patch Antenna Using 3D EM-based...TELKOMNIKA JOURNAL
 
5G Fixed Beam Switching on Microstrip Patch Antenna
5G Fixed Beam Switching on Microstrip Patch Antenna 5G Fixed Beam Switching on Microstrip Patch Antenna
5G Fixed Beam Switching on Microstrip Patch Antenna IJECEIAES
 
Dual-band aperture coupled antenna with harmonic suppression capability
Dual-band aperture coupled antenna with harmonic suppression capabilityDual-band aperture coupled antenna with harmonic suppression capability
Dual-band aperture coupled antenna with harmonic suppression capabilityTELKOMNIKA JOURNAL
 
Designing large-scale antenna array using sub-array
Designing large-scale antenna array using sub-arrayDesigning large-scale antenna array using sub-array
Designing large-scale antenna array using sub-arrayjournalBEEI
 
Validation study of path loss models on
Validation study of path loss models onValidation study of path loss models on
Validation study of path loss models onijngnjournal
 
Design of wideband dielectric resonator antenna with square slots excited usi...
Design of wideband dielectric resonator antenna with square slots excited usi...Design of wideband dielectric resonator antenna with square slots excited usi...
Design of wideband dielectric resonator antenna with square slots excited usi...Conference Papers
 
IRJET- Microstrip Patch Antenna for C Band Satellite Application
IRJET- Microstrip Patch Antenna for C Band Satellite ApplicationIRJET- Microstrip Patch Antenna for C Band Satellite Application
IRJET- Microstrip Patch Antenna for C Band Satellite ApplicationIRJET Journal
 
Simulation and optimization of tuneable microstrip patch antenna for fifth-ge...
Simulation and optimization of tuneable microstrip patch antenna for fifth-ge...Simulation and optimization of tuneable microstrip patch antenna for fifth-ge...
Simulation and optimization of tuneable microstrip patch antenna for fifth-ge...IJECEIAES
 
Numerical analysis of near field
Numerical analysis of near fieldNumerical analysis of near field
Numerical analysis of near fieldijngnjournal
 
Adjustment of Cost 231 Hata Path Model For Cellular Transmission in Rivers State
Adjustment of Cost 231 Hata Path Model For Cellular Transmission in Rivers StateAdjustment of Cost 231 Hata Path Model For Cellular Transmission in Rivers State
Adjustment of Cost 231 Hata Path Model For Cellular Transmission in Rivers StateIOSR Journals
 
A miniaturized printed UWB antenna with dual notching for X-b and and aeronau...
A miniaturized printed UWB antenna with dual notching for X-b and and aeronau...A miniaturized printed UWB antenna with dual notching for X-b and and aeronau...
A miniaturized printed UWB antenna with dual notching for X-b and and aeronau...TELKOMNIKA JOURNAL
 
5G beam-steering 2×2 butler matrix with slotted waveguide antenna array
5G beam-steering 2×2 butler matrix with slotted waveguide antenna array5G beam-steering 2×2 butler matrix with slotted waveguide antenna array
5G beam-steering 2×2 butler matrix with slotted waveguide antenna arrayTELKOMNIKA JOURNAL
 
Survey of analysis and performance of ofdm signals in time and frequency disp...
Survey of analysis and performance of ofdm signals in time and frequency disp...Survey of analysis and performance of ofdm signals in time and frequency disp...
Survey of analysis and performance of ofdm signals in time and frequency disp...eSAT Publishing House
 
Estimating cellphone signal intensity & identifying radiation hotspot are...
Estimating cellphone signal intensity & identifying radiation hotspot are...Estimating cellphone signal intensity & identifying radiation hotspot are...
Estimating cellphone signal intensity & identifying radiation hotspot are...eSAT Journals
 
IRJET- Design and Simulation of Mm Wave Sierpinski Antenna Loaded with Unipla...
IRJET- Design and Simulation of Mm Wave Sierpinski Antenna Loaded with Unipla...IRJET- Design and Simulation of Mm Wave Sierpinski Antenna Loaded with Unipla...
IRJET- Design and Simulation of Mm Wave Sierpinski Antenna Loaded with Unipla...IRJET Journal
 

Was ist angesagt? (19)

Analysis of near field distribution variation using awas electromagnetic code...
Analysis of near field distribution variation using awas electromagnetic code...Analysis of near field distribution variation using awas electromagnetic code...
Analysis of near field distribution variation using awas electromagnetic code...
 
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
 
Gain enhancement of microstrip patch antenna using artificial magnetic conductor
Gain enhancement of microstrip patch antenna using artificial magnetic conductorGain enhancement of microstrip patch antenna using artificial magnetic conductor
Gain enhancement of microstrip patch antenna using artificial magnetic conductor
 
Design and Analysis of Ku/K-band Circular SIW Patch Antenna Using 3D EM-based...
Design and Analysis of Ku/K-band Circular SIW Patch Antenna Using 3D EM-based...Design and Analysis of Ku/K-band Circular SIW Patch Antenna Using 3D EM-based...
Design and Analysis of Ku/K-band Circular SIW Patch Antenna Using 3D EM-based...
 
5G Fixed Beam Switching on Microstrip Patch Antenna
5G Fixed Beam Switching on Microstrip Patch Antenna 5G Fixed Beam Switching on Microstrip Patch Antenna
5G Fixed Beam Switching on Microstrip Patch Antenna
 
Dual-band aperture coupled antenna with harmonic suppression capability
Dual-band aperture coupled antenna with harmonic suppression capabilityDual-band aperture coupled antenna with harmonic suppression capability
Dual-band aperture coupled antenna with harmonic suppression capability
 
Designing large-scale antenna array using sub-array
Designing large-scale antenna array using sub-arrayDesigning large-scale antenna array using sub-array
Designing large-scale antenna array using sub-array
 
Validation study of path loss models on
Validation study of path loss models onValidation study of path loss models on
Validation study of path loss models on
 
Design of wideband dielectric resonator antenna with square slots excited usi...
Design of wideband dielectric resonator antenna with square slots excited usi...Design of wideband dielectric resonator antenna with square slots excited usi...
Design of wideband dielectric resonator antenna with square slots excited usi...
 
IRJET- Microstrip Patch Antenna for C Band Satellite Application
IRJET- Microstrip Patch Antenna for C Band Satellite ApplicationIRJET- Microstrip Patch Antenna for C Band Satellite Application
IRJET- Microstrip Patch Antenna for C Band Satellite Application
 
Simulation and optimization of tuneable microstrip patch antenna for fifth-ge...
Simulation and optimization of tuneable microstrip patch antenna for fifth-ge...Simulation and optimization of tuneable microstrip patch antenna for fifth-ge...
Simulation and optimization of tuneable microstrip patch antenna for fifth-ge...
 
Numerical analysis of near field
Numerical analysis of near fieldNumerical analysis of near field
Numerical analysis of near field
 
Adjustment of Cost 231 Hata Path Model For Cellular Transmission in Rivers State
Adjustment of Cost 231 Hata Path Model For Cellular Transmission in Rivers StateAdjustment of Cost 231 Hata Path Model For Cellular Transmission in Rivers State
Adjustment of Cost 231 Hata Path Model For Cellular Transmission in Rivers State
 
1110.1519
1110.15191110.1519
1110.1519
 
A miniaturized printed UWB antenna with dual notching for X-b and and aeronau...
A miniaturized printed UWB antenna with dual notching for X-b and and aeronau...A miniaturized printed UWB antenna with dual notching for X-b and and aeronau...
A miniaturized printed UWB antenna with dual notching for X-b and and aeronau...
 
5G beam-steering 2×2 butler matrix with slotted waveguide antenna array
5G beam-steering 2×2 butler matrix with slotted waveguide antenna array5G beam-steering 2×2 butler matrix with slotted waveguide antenna array
5G beam-steering 2×2 butler matrix with slotted waveguide antenna array
 
Survey of analysis and performance of ofdm signals in time and frequency disp...
Survey of analysis and performance of ofdm signals in time and frequency disp...Survey of analysis and performance of ofdm signals in time and frequency disp...
Survey of analysis and performance of ofdm signals in time and frequency disp...
 
Estimating cellphone signal intensity & identifying radiation hotspot are...
Estimating cellphone signal intensity & identifying radiation hotspot are...Estimating cellphone signal intensity & identifying radiation hotspot are...
Estimating cellphone signal intensity & identifying radiation hotspot are...
 
IRJET- Design and Simulation of Mm Wave Sierpinski Antenna Loaded with Unipla...
IRJET- Design and Simulation of Mm Wave Sierpinski Antenna Loaded with Unipla...IRJET- Design and Simulation of Mm Wave Sierpinski Antenna Loaded with Unipla...
IRJET- Design and Simulation of Mm Wave Sierpinski Antenna Loaded with Unipla...
 

Ähnlich wie Outage performance users located outside D2D coverage area in downlink cellular network

Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...TELKOMNIKA JOURNAL
 
Employing non-orthogonal multiple access scheme in UAV-based wireless networks
Employing non-orthogonal multiple access scheme in UAV-based wireless networksEmploying non-orthogonal multiple access scheme in UAV-based wireless networks
Employing non-orthogonal multiple access scheme in UAV-based wireless networksjournalBEEI
 
Paper id 25201478
Paper id 25201478Paper id 25201478
Paper id 25201478IJRAT
 
A low complexity distributed differential scheme based on orthogonal space t...
A low complexity distributed differential scheme based on  orthogonal space t...A low complexity distributed differential scheme based on  orthogonal space t...
A low complexity distributed differential scheme based on orthogonal space t...IJECEIAES
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...IJCNCJournal
 
Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...TELKOMNIKA JOURNAL
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Channel state information estimation for reconfigurable intelligent surfaces ...
Channel state information estimation for reconfigurable intelligent surfaces ...Channel state information estimation for reconfigurable intelligent surfaces ...
Channel state information estimation for reconfigurable intelligent surfaces ...IJECEIAES
 
Average symbol error rate analysis of reconfigurable intelligent surfaces-as...
Average symbol error rate analysis of reconfigurable intelligent  surfaces-as...Average symbol error rate analysis of reconfigurable intelligent  surfaces-as...
Average symbol error rate analysis of reconfigurable intelligent surfaces-as...IJECEIAES
 
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...TELKOMNIKA JOURNAL
 
Modelling and QoS-Achieving Solution in full-duplex Cellular Systems
Modelling and QoS-Achieving Solution in full-duplex Cellular SystemsModelling and QoS-Achieving Solution in full-duplex Cellular Systems
Modelling and QoS-Achieving Solution in full-duplex Cellular SystemsIJCNCJournal
 
Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...
Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...
Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...IJECEIAES
 
Proposed Model for Interference Estimation in Code Division Multiple Access
Proposed Model for Interference Estimation in Code Division Multiple AccessProposed Model for Interference Estimation in Code Division Multiple Access
Proposed Model for Interference Estimation in Code Division Multiple AccessTELKOMNIKA JOURNAL
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkTELKOMNIKA JOURNAL
 
Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...TELKOMNIKA JOURNAL
 
Design of omnidirectional linearly polarized hemispherical dra for
Design of omnidirectional linearly polarized hemispherical dra forDesign of omnidirectional linearly polarized hemispherical dra for
Design of omnidirectional linearly polarized hemispherical dra forIAEME Publication
 
PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...
PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...
PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...IJEEE
 
E03702038045
E03702038045E03702038045
E03702038045theijes
 

Ähnlich wie Outage performance users located outside D2D coverage area in downlink cellular network (20)

Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...
 
Employing non-orthogonal multiple access scheme in UAV-based wireless networks
Employing non-orthogonal multiple access scheme in UAV-based wireless networksEmploying non-orthogonal multiple access scheme in UAV-based wireless networks
Employing non-orthogonal multiple access scheme in UAV-based wireless networks
 
Paper id 25201478
Paper id 25201478Paper id 25201478
Paper id 25201478
 
A low complexity distributed differential scheme based on orthogonal space t...
A low complexity distributed differential scheme based on  orthogonal space t...A low complexity distributed differential scheme based on  orthogonal space t...
A low complexity distributed differential scheme based on orthogonal space t...
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
 
2015LISAT_pathloss1
2015LISAT_pathloss12015LISAT_pathloss1
2015LISAT_pathloss1
 
Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Channel state information estimation for reconfigurable intelligent surfaces ...
Channel state information estimation for reconfigurable intelligent surfaces ...Channel state information estimation for reconfigurable intelligent surfaces ...
Channel state information estimation for reconfigurable intelligent surfaces ...
 
Average symbol error rate analysis of reconfigurable intelligent surfaces-as...
Average symbol error rate analysis of reconfigurable intelligent  surfaces-as...Average symbol error rate analysis of reconfigurable intelligent  surfaces-as...
Average symbol error rate analysis of reconfigurable intelligent surfaces-as...
 
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
 
Modelling and QoS-Achieving Solution in full-duplex Cellular Systems
Modelling and QoS-Achieving Solution in full-duplex Cellular SystemsModelling and QoS-Achieving Solution in full-duplex Cellular Systems
Modelling and QoS-Achieving Solution in full-duplex Cellular Systems
 
Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...
Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...
Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...
 
Proposed Model for Interference Estimation in Code Division Multiple Access
Proposed Model for Interference Estimation in Code Division Multiple AccessProposed Model for Interference Estimation in Code Division Multiple Access
Proposed Model for Interference Estimation in Code Division Multiple Access
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA network
 
Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...
 
Design of omnidirectional linearly polarized hemispherical dra for
Design of omnidirectional linearly polarized hemispherical dra forDesign of omnidirectional linearly polarized hemispherical dra for
Design of omnidirectional linearly polarized hemispherical dra for
 
PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...
PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...
PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...
 
E03702038045
E03702038045E03702038045
E03702038045
 

Mehr von journalBEEI

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherjournalBEEI
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksjournalBEEI
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkjournalBEEI
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headjournalBEEI
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...journalBEEI
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)journalBEEI
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...journalBEEI
 

Mehr von journalBEEI (20)

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
 

Kürzlich hochgeladen

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Kürzlich hochgeladen (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 

Outage performance users located outside D2D coverage area in downlink cellular network

  • 1. Bulletin of Electrical Engineering and Informatics Vol. 10, No. 3, June 2021, pp. 1380∼1387 ISSN: 2302-9285, DOI: 10.11591/eei.v10i3.2298 r 1380 Outage performance users located outside D2D coverage area in downlink cellular network Thanh-Luan Nguyen, Dinh-Thuan Do Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh City, Vietnam Article Info Article history: Received May 24, 2020 Revised Apr 4, 2021 Accepted Apr 21, 2021 Keywords: Device-to-device Stochastic geometry Outage probability ABSTRACT Device-to-device (D2D) communication has been proposed to employ the proximity between two devices to enhance the overall spectrum utilization of a crowded cellular network. With the help of geometric probability tools, this framework considers the performance of cellular users under spatial separation with the D2D pair is investi- gated. The measurement results and analytical expression of outage probability show that the proposed frameworks improve the outage performance at a high signal-to- noise ratio (SNR) at the base station. Results also interpret that the distances between nodes in the D2D-assisted network make slight impacts on the performance of the cellular user. This is an open access article under the CC BY-SA license. Corresponding Author: Dinh-Thuan Do Faculty of Electronics Technology Industrial University of Ho Chi Minh City 12 Nguyen Van Bao Road, Go Vap District, Ho Chi Minh City, Vietnam Email: dodinhthuan@iuh.edu.vn 1. INTRODUCTION Device to device (D2D) communication has recently been introduced in 3rd-generation partnership project (3GPP) long term evolution (LTE) Release 12 and 13. D2D, together with the core technologies, is proposed for forthcoming 5th generation (5G) cellular standard. In wireless cellular networks, the device-to- device (D2D) communications allow devices in close proximity to transmit and receive signals directly without connecting with base stations (BSs). Therefore, to reduce the high load from core networks, D2D has been recognized as a reasonable technique [1]-[3]. Together operation of the cellular network, the D2D devices are able to share the same spectrum resources with cellular users (CUs), and the spectral efficiency can be enhanced. In principle, D2D and cellular communication links are categorized into two kinds, including the overlay and underlay spectrum sharing techniques [4]. D2D users can only utilize the idle spectrum that is not currently employed by the CUs in the overlay D2D mode. The underlay spectrum sharing mode permits D2D pair users to occupy the resource of the cellular connections. The co-channel interference between the D2D and cellular links occurs, and such limitations need to be addressed. Therefore, the resource allocation problems are studied in D2D communications underlaying the cellular networks [5]-[7]. In [5], to maximize the sum rate of D2D links, the authors presented a power allocation scheme, and guarantee the performance of the cellular link at the same time. In order to maximize the rate of the single D2D link in [6], power allocation for D2D and cellular links is studied. The multiple cellular and D2D links are investigated in [7]. Considering the advantages of D2D communication, There are some studies on the usage of D2D com- munications in [8]-[12]. The cellular networks require high maintenance costs and additional infrastructure, and more difficulties with a large amount of equipment. In order to address these challenges, D2D communica- Journal homepage: http://beei.org
  • 2. Bulletin of Electr Eng & Inf ISSN: 2302-9285 r 1381 tions have been proposed as an essential technique to implement with non-orthogonal multiple access (NOMA) networks, the heterogeneous network recently [13]-[19]. To study a large number of nodes at various locations in D2D, stochastic geometry is a sophisticated tool from mathematics to provide insights into spatial averages taken over several realizations. Many metrics can be evaluated, such as outage probability, interference, data rate, and signal-to-interference-plus-noise ratio (SINR) [20],[21]. Stochastic geometry can be employed to design many applications related to D2D [22],[23]. Moreover, the published works [24]-[28] also study the performance of underlay D2D networks. The outage probability of random D2D communication in millimeter-wave cellular networks is studied in [24]. Moreover, the authors in [25] investigate the performance over nakagami-m fading channels. The paper [26] also attempts to investigate the secure property of the D2D network. An interesting model where multiple D2D pairs are deployed is proposed in [27]. An extension to full-duplex communication for the D2D network is introduced by [28]. In the above works, there is no concern over the spatial separation between the cellular network and the D2D network. In addition, statistical properties of the distance between users in cellular networks and D2D networks under the nodal distancing constraint have not been reported in the literature. Motivated by these analysis, this paper examines outage performance of traditional users located in outside of D2D serving area in cellular network. 2. SYSTEM MODEL We consider a downlink wireless network in which there is a base station (BS), a cellular user (CUE) sharing resources with a D2D transmitter (D2D-Tx), as plotted in Figure 1. The CUE is uniformly distributed inside the cellular coverage area with radius Rc around the BS. In addition, the CUE is located outside the D2D coverage area with radius Rd Rc around the D2D-Tx. We facilitate each node with a single antenna. Further, the channel coefficients of the links from the BS and from the D2D-Tx to the CUE are de- noted by h and g, respectively. We assume all channels to be experiencing independent Rayleigh fading with E[|h|2 ] = E[|g|2 ] = 1. To capture the large-scale propagation, we adopt the power-law path-loss model where R and L are the corresponding distances to the CUE, and η denotes the pathloss exponent. Moreover, we assume a block-fading model in which all channels are invariant during the transmission of a block and vary independently among different blocks. Rc Cellular Coverage Area D2D Coverage Area g,L CUE Rd Dt h,R D2D-Tx Information Link Interference Link Figure 1. The proposed underlay D2D communication network. In the downlink, the CUE receives the information signal from the BS while being interfered by the D2D-Tx. Subsequently, the received signal at the CUE is given by y = p Pbx h √ Rη + p Pts g √ Lη + n, (1) Outage performance users located outside D2D coverage area in downlink ... (Thanh-Luan Nguyen)
  • 3. 1382 r ISSN: 2302-9285 in which Pb and Pt are the transmit powers from the BS and the D2D-Tx, respectively, x and s are the corre- sponding signals. Herein, E[|x|2 ] = E[|s|2 ] = 1, and n denotes the additive white Gaussian noise (AWGB) at the CUE with zero mean and variance σ2 . Hence, the achievable instantaneous rate at the given CUE is R = log2 1 + Pb |h|2 Rη Pt |g|2 Lη + σ2 ! . (2) 3. DISTANCE DISTRIBUTION This section studies the stochastic properties of the link distances. Particularly, the CDF and PDF of the distances R and L are derived in closed-form. It should be mentioned that both L and R are dependent on the location of the CUE. 3.1. Preliminaries In this subsection, we specify the distribution, i.e., CDF and PDF, of the distance from a fixed point A to the random point C. Particularly, the point C uniformly distributed inside the circular area with the radius R around a fixed point B, i.e., C ∈ C(B, R). The distance probability distribution function is considered in two different cases as depicted in [29, Eq.(34)], and can be formulated as FAC(AC) = |C(A, AC) ∩ C(B, R)| |C(B, R)| , AB − R AC AB + R, (3) in which | · | denotes the Lebesgue measure. Denoting AT OT , C(A, AC) ∩ C(B, R), for the case AB ≥ R, |AT OT | is calculated as by [29] |AT OT | = π 2 (AC2 + R2 ) − AC2 sin−1 AB2 + AC2 − R2 2AC.AB + R2 sin−1 AC2 − AB2 − R2 2R.AB − 1 2 p (AC2 − (AB − R)2)((AB + R)2 − AC2) , S(AB, R; AC), (4) with AB − R ≤ AC ≤ AB + R. For the case AB ≤ R, the area of AT OT is obtained as [29] |AT OT | = ( πAC2 , 0 ≤ AC ≤ R − AB S(AB, R; AC) , R − AB ≤ AC ≤ R + AB (5) 3.2. The information links Initially, let AC be the 2D-Euclidean space in which the CUE uniformly distributed and AD be the coverage area around the D2D-Tx. To reduce the cross-mode interference, the interference from the D2D-Tx to the CUE and vice versa, it is assumed that AC and AD are disjoint meaning that the CUE is located outside the D2D proximity. Hence, the CDF of R is given as FR(r) = |C(BS, r)AD| |AC| , 0 r Rc. (6) Denoting S , C(BS, r)AD, the above expression can further be derived via the four following cases. a) Case Dt + Rd ≤ Rc ∧ Dt ≥ Rd: As shown in Figure 2, |AC| = πR2 c − πR2 d and the calculation for |S| is divided into three following subcases: 1) if 0 r Dt − Rd, it is clearly that |S| = πr2 , 2) if DR + Rd r Rc, |S| = πr2 − πR2 d and 3) if Dt − Rd r Dt + Rd, thus |S| = |C(BS, r)| − |C(BS, r) ∩ AD| = πr2 − S(Dt, Rd; r). (7) Now, the corresponding PDF is obtained by substituting (7) into (6) and then taking the derivative of the resulted FR(r), thus fR(r) = 1 πR2 c − πR2 d        2πr , 0 r Dt − Rd πr + 2r sin−1 D2 t +r2 −R2 d 2Dtr , Dt − Rd r Dt + Rd 2πr , Dt + Rd r Rc (8) Bulletin of Electr Eng Inf, Vol. 10, No. 3, June 2021 : 1380 – 1387
  • 4. Bulletin of Electr Eng Inf ISSN: 2302-9285 r 1383 Note that [29] ∂ ∂AC S(AB, R; AC) = πAC − 2AC sin−1 AB2 + AC2 − R2 2AB.R . (9) b) Case Dt + Rd ≤ Rc ∧ Dt ≤ Rd: As shown in Figure 3, |AC| = πR2 c − πR2 d and |S| is derived as following subcases: 1) if 0 r Rd − Dt, thus |S| = 0, 2) if Dt + Rd r Rc, thus |S| = πr2 − πR2 d , and 3) if Dt − Rd r Dt + Rd, |S| = πr2 − S(Dt, Rd; r). As a result, the corresponding PDF is given by fR(r) = 1 πR2 c − πR2 d        0 , 0 r Rd − Dt πr + 2r sin−1 D2 t +r2 −R2 d 2Dtr , Dt − Rd r Dt + Rd 2πr , Dt + Rd r Rc (10) c) Case Dt + Rd ≥ Rc ≥ Dt − Rd: The cellular coverage is given as |AC| = πR2 c − |A| where A = C(BS, Rc) ∩ AD as shown in Figure 4. It is known that [30] |A| =R2 d cos−1 D2 t + R2 d − R2 c 2DtRd + R2 c cos−1 D2 t + R2 c − R2 d 2DtRc − 1 2 p (−Dt + Rd + Rc)(Dt + Rd − Rc)(Dt − Rd + Rc)(Dt + Rd + Rc). (11) In this case, |S| can be derived via the two following subcases: 1) if 0 r Rd −Dt, thus |S| = πr2 , and 2) if Dt − Rd r Dt + Rd, |S| = πr2 − S(Dt, Rd; r). Hence, the PDF of the distance of the information link is then obtained as fR(r) = 1 πR2 c − |A| ( 2πr , 0 r Dt − Rd πr + 2r sin−1 D2 t +r2 −R2 d 2Dtr , Dt − Rd r Rc (12) d) Case Dt − Rd ≥ Rc: In this case, C(BS, Rc)∩AD = ∅, thus the CDF and the PDF of the distance R are immediately given as FR(r) = r2 R2 c , 0 r Rc, (13) fR(r) = 2r R2 c , 0 r Rc. (14) Rc Dt Rd r Figure 2. A realization of Dt + Rd ≤ Rc ∧ Dt ≥ Rd Rc Dt Rd r Figure 3. A realization of Dt + Rd ≤ Rc ∧ Dt ≤ Rd Rc Dt Rd r Figure 4. A realization of Dt + Rd ≥ Rc ≥ Dt − Rd Outage performance users located outside D2D coverage area in downlink ... (Thanh-Luan Nguyen)
  • 5. 1384 r ISSN: 2302-9285 3.3. The interference links In this subsection, the CDF and PDF of the link distance from the interfering D2D-Tx to the CUE are studied. Similar to the previous parts, the CDF of the distance L is given as FL(r) = |AC ∩ C(D2D-Tx, r)| |AC| , 0 r Dt + Rd. (15) Note that we reuse the notation S , AC ∩ C(D2D-Tx, r) for the following analysis. Subsequently, the above expression can further be derived via the three following cases. a) Case Dt + Rd ≤ Rc: Similarly, |AC| = πR2 c − πR2 d and |S| is derived by the following subcases. 1) if r Rd, it is obvious that |S| = 0, 2) if Rd r Rc − Dt, |S| = πr2 − πR2 d, and 3) if Rc − Dt r Rc + Dt, |S| = S(Dt, Rc; r) − πR2 d. Subsequently, the PDF of the interference distance is then given as fL(r) = 1 πR2 c − πR2 d        0 , 0 r Rd 2πr , Rd r Rc − Dt πr − 2r sin−1 D2 t +r2 −R2 c 2Dtr , Rc − Dt r Rc + Dt (16) b) Case Dt + Rd ≥ Rc ≥ Dt − Rd: Similar to the previous subsection, |AC| = πR2 c − |A| and |S| = S(Dt, Rd; r) − |A| if Rd r Rd + Dt whereas |S| = 0 whenever r Rd. Hence, fL(r) = 1 πR2 c − |A| ( 0 , 0 r Rd πr − 2r sin−1 D2 t +r2 −R2 c 2Dtr , Rd r Rc + Dt (17) c) Case Dt − Rd ≥ Rc: In this case, |AC| = πR2 c and |S| is obtained as [...] |S| = ( S(Dt, Rc; r) , Dt − Rc r Dt + Rc 0 , 0 r Dt − Rc (18) Substituting the above result into (15) and with the help of (9), one can the obtain fL(r) = 1 πR2 c ( πr − 2r sin−1 D2 t +r2 −R2 c 2Dtr , Dt − Rc r Dt + Rc 0 , 0 r Dt − Rc (19) 4. OUTAGE PERFORMANCE In this section, we investigate the outage probability of the proposed system. Let Rth be the target data rate of the CUE, thus the probability for the instantaneous rate at this CUE falls below Rth is mathematically expressed as Pout = Pr{R R̄th} (20) =1 − Pr |h|2 ≥ Rη γ̄th γ̄b γ̄t|g|2 Lη + 1 , (21) in which γ̄th , 2Rth −1, γ̄b , Pb/σ2 and γ̄t , Pt/σ2 . Now that |h| and |g| are both independent and identical Rayleigh distributed random variables with unit variance, thus the CDF of |h|2 and the PDF of |g|2 are given by F|h|2 (x) = 1 − e−x , x 0, f|g|2 (x) = e−x , x 0, Bulletin of Electr Eng Inf, Vol. 10, No. 3, June 2021 : 1380 – 1387
  • 6. Bulletin of Electr Eng Inf ISSN: 2302-9285 r 1385 respectively. Hence (21) can further be expressed as Pout =1 − ER,|g|2,L exp − Rη γ̄th γ̄b γ̄t|g|2 Lη + 1 (22) ≈1 − Rc Z 0 exp − rη γ̄th γ̄b (γ̄tḡ + 1) fR(r)dr, (23) in which (23) is proposed to approximate (22). The tightness of this approximation will be verified later in the next section. Herein, ḡ denotes the mean interference channel power gain at the CUE and is calculated as ḡ , E[|g|2 L−η ] = Dt+Rc Z 0 fL(l) lη dl. (24) 5. NUMERICAL RESULTS In this section, Monte Carlo simulations are constrcuted to validate our analysis in the previous sec- tions. The default settings for the results are Rc = 15 (m), Rd = 5 (m), Rth = 0.5 (bps/Hz), γ̄t = 10 (dB) and η = 2. In addition, the average transmit SNR is set to γ̄b = 30 (dB) in the Figure 6. 0 5 10 15 20 25 30 35 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Outage Probability Simulation (Eq. (2)) Proposed Approximation (Eq. (22)) Figure 5. Outage probability at the CUE versus the average transmit signal-to-noise of the BS (γ̄b) and the distance Dt (m) Figure 5 shows the outage performance comparison of conventional user as changing Dt. It can be seen that as varying Dt from 5 (m) to 12.5 (m), a small performance gap emerges. Increasing transmit SNR at the BS contributes to improving outage performance. It is confirmed that analytical and simulation results are matched very tight at the whole range of SNR. Hence, it can be believed that the proposed approximation acceptably tight. Figure 6 further evaluates the mean interference channel power gain of the considered system to validate our exact analysis for the link distance distribution. Outage performance users located outside D2D coverage area in downlink ... (Thanh-Luan Nguyen)
  • 7. 1386 r ISSN: 2302-9285 0 5 10 15 20 25 1 2 3 4 5 6 7 8 9 10 11 10-3 Simulation Analytical (Eq. (23)) Figure 6. Mean interference channel power gain at the CUE versus the distance Dt (m) 6. CONCLUSION In this paper, we have studied the outage performance problem of a cellular user in the context of the D2D underlying cellular network. The outage probability of users in D2D communication is computed. Specifically, the distance from the cellular user to the BS and from the D2D transmitter to the user are both statistically characterized using stochastic geometry tools. We also derived the exact and approximated expres- sions of outage probability at the cellular node. Numerical results are provided to verify our derivations. The paper is, however, limited at downlink single-cell networks, and will be extended to the multi-cell sencario in our future works. REFERENCES [1] K. Doppler, M. Rinne, C. Wijting, C. Ribeiro, and K. Hugl, ”Device-todevice communication as an underlay to LTE-advanced networks,” IEEE Commun. Mag., vol. 47, no. 12, pp. 42–49, Dec. 2009. [2] G. Fodor et al., ”Design aspects of network assisted device-to-device communications,” IEEE Commun. Mag., vol. 50, no. 3, pp. 170–177, Mar. 2012. [3] J. Liu, Y. Kawamoto, H. Nishiyama, N. Kato, and N. Kadowaki, ”Device-to-device communications achieve efficient load balancing in LTE-advanced networks,” IEEE Wirel. Commun. Mag., vol. 21, no. 2, pp. 57–65, Feb. 2014. [4] X. Lin, J. G. Andrews, and A. Ghosh, ”Spectrum sharing for deviceto-device communication in cellular networks,” IEEE Trans. Wirel. Commun., vol. 13, no. 12, pp. 6727–6740, Dec. 2014. [5] C.-H. Yu, O. Tirkkonen, K. Doppler, and C. Ribeiro, ”On the performance of device-to-device underlay communica- tion with simple power control,” Proc. VTC, Apr. 2009, pp. 1–5. [6] J. Wang, D. Zhu, C. Zhao, J. C. F. Li, and M. Lei, ”Resource sharing of underlaying device-to-device and uplink cellular communications,” IEEE Commun. Lett., vol. 17, no. 6, pp. 1148–1151, Jun. 2013. [7] D. Feng, L. Lu, Y. Yuan-Wu, G. Y. Li, G. Feng, and S. Li, ”Deviceto-device communications underlaying cellular networks,” IEEE Trans. Commun., vol. 61, no. 8, pp. 3541–3551, Aug. 2013. Bulletin of Electr Eng Inf, Vol. 10, No. 3, June 2021 : 1380 – 1387
  • 8. Bulletin of Electr Eng Inf ISSN: 2302-9285 r 1387 [8] J. Liu, N. Kato, J. Ma, and N. Kadowaki, ”Device-to-device communication in LTE-advanced networks: A survey,” IEEE Commun. Surv. Tuts., vol. 17, no. 4, pp. 1923–1940, 4th Quart., 2015. [9] F. Jameel, Z. Hamid, F. Jabeen, S. Zeadally, and M. A. Javed, ”A survey of device-to-device communications: Re- search issues and challenges,” IEEE Commun. Surv. Tuts., vol. 20, no. 3, pp. 2133–2168, 3rd Quart., 2018. [10] P. Gandotra and R. K. Jha, ”Device-to-device communication in cellular networks: A survey,” J. Netw. Comput. Appl., vol. 71, pp. 99–117, Aug. 2016. [11] H. A. U. Mustafa, M. A. Imran, M. Z. Shakir, A. Imran, and R. Tafazolli, ”Separation framework: An enabler for cooperative and D2D communication for future 5G networks,” IEEE Commun. Surv. Tuts., vol. 18, no. 1, pp. 419–445, 1st Quart., 2016. [12] M. Höyhtyä, O. Apilo, and M. Lasanen, ”Review of latest advances in 3GPP standardization: D2D communication in 5G systems and its energy consumption models,” Future Internet, vol. 10, no. 1, p. 3, 2018. [13] D. Feng et al., ”Mode switching for energy-efficient device-to-device communications in cellular networks,” IEEE Trans. Wirel. Commun., vol. 14, no. 12, pp. 6993–7003, Dec. 2015. [14] X. Lin, J. G. Andrews, and A. Ghosh, ”Spectrum sharing for deviceto-device communication in cellular networks,” IEEE Trans. Wirel. Commun., vol. 13, no. 12, pp. 6727–6740, Dec. 2014. [15] L. Zhang, M. Xiao, G. Wu, and S. Li, ”Efficient scheduling and power allocation for D2D-assisted wireless caching networks,” IEEE J. Sel. Areas Commun., vol. 64, no. 6, pp. 2438–2452, Jun. 2016. [16] S. Xu, H. Zhang, J. Tian, and P. T. Mathiopoulos, ”Pilot reuse and power control of D2D underlaying massive MIMO systems for energy efficiency optimization,” Sci. China Inf. Sci., vol. 60, no. 10, 2017, Art. no. 100303. [17] Dinh-Thuan Do, A.-T. Le, C.-B. Le and B. M. Lee, ”On Exact Outage and Throughput Performance of Cognitive Radio based Non-Orthogonal Multiple Access Networks With and Without D2D Link,” Sensors, 19 (15): 3314, 2019. [18] C.-B. Le and Dinh-Thuan Do, ”Joint Evaluation of Imperfect SIC and Fixed Power Allocation Scheme for Wireless Powered D2D-NOMA networks with multiple antennas at Base Station,” Wireless Networks, vol. 25, no. 8, pp. 5069–5081, 2019 [19] H.P.-Dang, Dinh-Thuan Do, et al, ”Power Beacon-based Wireless Power Transfer in MISO/SISO: An application in Device-to-Device networks,” Wireless Personal Communications (Springer), Vol. , No. , pp. , 2019. [20] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, ”Stochastic geometry and random graphs for the analysis and design of wireless networks,” IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029–1046, Sep. 2009. [21] H. Elsawy, E. Hossain, and M. Haenggi, ”Stochastic geometry for modeling, analysis, and design of multi-tier and cognitive cellular wireless networks: A survey,” IEEE Commun. Surv. Tuts., vol. 15, no. 3, pp. 996–1019, Jun. 2013. [22] O. A. Amodu, M. Othman, N. K. Noordin and I. Ahmad, ”Relay-Assisted D2D Underlay Cellular Network Analysis Using Stochastic Geometry: Overview and Future Directions,” IEEE Access, vol. 7, pp. 115023-115051, 2019. [23] D. Singh and S. C. Ghosh, ”Mobility-Aware Relay Selection in 5G D2D Communication Using Stochastic Model,” IEEE Trans. Veh. Technol., vol. 68, no. 3, pp. 2837-2849, March 2019. [24] S. Kusaladharma, Z. Zhang and C. Tellambura, ”Interference and Outage Analysis of Random D2D Networks Un- derlaying Millimeter-Wave Cellular Networks,” IEEE Trans. Commun., vol. 67, no. 1, pp. 778-790, Jan. 2019. [25] I. Singh, R. K. Jaiswal, V. Kumar, R. Verma, N. P. Singh and G. Singh, ”Outage Probability of Device-to-Device Communication Underlaying Cellular Network over NakagamiRayleigh Fading Channels,” 2019, 9th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP- 19), Nagpur, India, 2019, pp. 1-5. [26] J. Lyu, T. Zheng, K. Huang, Y. Feng and H. Wang, ”Secure Transmissions of D2D Underlay Cellular Networks with Poisson Cluster Process,” 2019, IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 2019, pp. 1-6. [27] J. Lee and J. H. Lee, ”Performance Analysis and Resource Allocation for Cooperative D2D Communication in Cellular Networks With Multiple D2D Pairs,” IEEE Commun. Lett., vol. 23, no. 5, pp. 909-912, May 2019. [28] G. Liu, W. Feng, Z. Han and W. Jiang, ”Performance Analysis and Optimization of Cooperative Full-Duplex D2D Communication Underlaying Cellular Networks,” IEEE Trans. Wirel. Commun, vol. 18, no. 11, pp. 5113-5127, Nov. 2019. [29] F. Adelantado, J. Prez-Romero, and O. Sallent, “Nonuniform traffic distribution model in reverse link of multi- rate/multiservice wcdma-based systems,” IEEE Trans. Veh. Technol., vol. 56, no. 5, p. 29022914, Sep. 2007. [30] Weisstein, Eric W. ”Circle-Circle Intersection.” From MathWorld–A Wolfram Web Resource. http://mathworld.wolfram.com/Circle-CircleIntersection.html Outage performance users located outside D2D coverage area in downlink ... (Thanh-Luan Nguyen)