dc.contributor.author | Jameel, Furqan | |
dc.contributor.author | Khan, Wali Ullah | |
dc.contributor.author | Chang, Zheng | |
dc.contributor.author | Ristaniemi, Tapani | |
dc.contributor.author | Liu, Ju | |
dc.date.accessioned | 2019-08-30T06:50:50Z | |
dc.date.available | 2019-08-30T06:50:50Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Jameel, F., Khan, W. U., Chang, Z., Ristaniemi, T., & Liu, J. (2019). Secrecy analysis and learning-based optimization of cooperative NOMA SWIPT systems. In <i>2019 IEEE International Conference on Communications Workshops (ICC Workshops 2019)</i>. IEEE. IEEE International Conference on Communications. <a href="https://doi.org/10.1109/ICCW.2019.8756894" target="_blank">https://doi.org/10.1109/ICCW.2019.8756894</a> | |
dc.identifier.other | CONVID_32505025 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/65375 | |
dc.description.abstract | Non-orthogonal multiple access (NOMA) is considered to be one of the best candidates for future networks due to its ability to serve multiple users using the same resource block. Although early studies have focused on transmission reliability and energy efficiency, recent works are considering cooperation among the nodes. The cooperative NOMA techniques allow the user with a better channel (near user) to act as a relay between the source and the user experiencing poor channel (far user). This paper considers the link security aspect of energy harvesting cooperative NOMA users. In particular, the near user applies the decode-and-forward (DF) protocol for relaying the message of the source node to the far user in the presence of an eavesdropper. Moreover, we consider that all the devices use power-splitting architecture for energy harvesting and information decoding. We derive the analytical expression of intercept probability. Next, we employ deep learning based optimization to find the optimal power allocation factor. The results show the robustness and superiority of deep learning optimization over conventional iterative search algorithm. | en |
dc.format.mimetype | application/pdf | |
dc.language | eng | |
dc.language.iso | eng | |
dc.publisher | IEEE | |
dc.relation.ispartof | 2019 IEEE International Conference on Communications Workshops (ICC Workshops 2019) | |
dc.relation.ispartofseries | IEEE International Conference on Communications | |
dc.rights | In Copyright | |
dc.subject.other | Decode-and-forward (DF) | |
dc.subject.other | Deep learning | |
dc.subject.other | Nonorthogonal multiple access (NOMA) | |
dc.subject.other | Power-splitting | |
dc.title | Secrecy analysis and learning-based optimization of cooperative NOMA SWIPT systems | |
dc.type | conference paper | |
dc.identifier.urn | URN:NBN:fi:jyu-201908303979 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.relation.isbn | 978-1-72812-373-8 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.relation.issn | 1550-3607 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | ©2019 IEEE | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | conferenceObject | |
dc.relation.conference | IEEE International Conference on Communications Workshops | |
dc.subject.yso | optimointi | |
dc.subject.yso | tietoturva | |
dc.subject.yso | 5G-tekniikka | |
dc.subject.yso | koneoppiminen | |
dc.subject.yso | langaton tiedonsiirto | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p13477 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p29372 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p21846 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5445 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.1109/ICCW.2019.8756894 | |
jyx.fundinginformation | This work is partially supported by the National Key R & D Plan (2017YFC0803403), the National Natural Science Foundation of China (61371188) and the Fundamental Research Funds of Shandong University (2018GN051). | |
dc.type.okm | A4 | |